Author of the publication

A Certificate-Based Signature Scheme.

, , and . CT-RSA, volume 2964 of Lecture Notes in Computer Science, page 99-111. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Preimage Resistance and Permutation-based Hash Functions., and . IACR Cryptology ePrint Archive, (2009)A New Forward Secure Signature Scheme., , and . IACR Cryptology ePrint Archive, (2004)Cryptanalysis of Some Group-Oriented Proxy Signature Schemes., , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 10-24. Springer, (2005)Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006., and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 686-691. Springer, (2007)Comments on "Certificateless Short Aggregate Signature Scheme for Mobile Devices"., and . IEEE Access, (2024)Security of Lu et al.'s proxy-protected signature scheme., and . Appl. Math. Comput., 169 (2): 1010-1015 (2005)Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (1): 129-138 (2011)Efficient Delegation of Pairing Computation., , and . IACR Cryptology ePrint Archive, (2005)Fast Elliptic Curve Point Counting Using Gaussian Normal Basis., , , , , and . ANTS, volume 2369 of Lecture Notes in Computer Science, page 292-307. Springer, (2002)Preimage resistance of LPmkr with r=m-1., and . Inf. Process. Lett., 110 (14-15): 602-608 (2010)