Author of the publication

Cryptanalysis of a certificateless signcryption scheme in the standard model.

, , , , and . Inf. Sci., 181 (3): 661-667 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-Based Parallel Key-Insulated Signature Without Random Oracles., , , and . J. Inf. Sci. Eng., 24 (4): 1143-1157 (2008)Robust password changing and DoS resilience for human-centric password authentication., , , , and . Security and Communication Networks, 7 (10): 1552-1559 (2014)Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model., , and . Informatica, Lith. Acad. Sci., 23 (3): 443-460 (2012)(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions., , , and . IACR Cryptology ePrint Archive, (2014)Toward optimizing cauchy matrix for cauchy reed-solomon code., , , , and . IEEE Communications Letters, 13 (8): 603-605 (2009)A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register., , , and . J. Inf. Sci. Eng., 24 (5): 1347-1360 (2008)Basing Diversified Services of Complex IIoT Applications on Scalable Block Graph Platform., , , and . IEEE Access, (2019)Identity Based Conference Key Distribution Scheme from Parings., , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 845-852. Springer, (2005)Linkable Ring Signatures from Linear Feedback Shift Register., , , and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 716-727. Springer, (2007)YI Cloud: Improving user privacy with secret key recovery in cloud storage., , , , and . SOSE, page 268-272. IEEE Computer Society, (2011)