Author of the publication

A Certificate-Based Signature Scheme.

, , and . CT-RSA, volume 2964 of Lecture Notes in Computer Science, page 99-111. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Zhou et al.'s proxy-protected signature schemes., , and . Appl. Math. Comput., 169 (1): 192-197 (2005)Powered Tate Pairing Computation., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (1): 338-341 (2008)Powered Tate Pairing Computation., and . IACR Cryptology ePrint Archive, (2005)Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure in Post-Quantum Cryptography., , , , , and . IACR Cryptol. ePrint Arch., (2023)A New Forward Secure Signature Scheme., , and . IACR Cryptology ePrint Archive, (2004)Cryptanalysis of Some Group-Oriented Proxy Signature Schemes., , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 10-24. Springer, (2005)Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006., and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 686-691. Springer, (2007)An Efficient Hardware/Software Co-Design for FALCON on Low-End Embedded Systems., , , , , , , , , and 1 other author(s). IEEE Access, (2024)Security of Lu et al.'s proxy-protected signature scheme., and . Appl. Math. Comput., 169 (2): 1010-1015 (2005)Efficient Delegation of Pairing Computation., , and . IACR Cryptology ePrint Archive, (2005)