On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Certified E-Mail Protocol in the ID-Based Setting
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
An Efficient ID-Based Proxy Signature Scheme from Pairings
Information Security and Cryptology
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Information Security and Cryptology
An ID-Based verifiable encrypted signature scheme based on hess’s scheme
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Hi-index | 0.00 |