IoT-friendly certificateless signcryption schemes: Introducing a provably secure scheme in ROM
|
10.1016/j.jisa.2025.103979 |
1403 - 12 |
On Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles: Cryptanalysis and Improvements
|
10.1109/ACCESS.2024.3488570 |
1403 - 08 |
ECKCI: An ECC-Based Authenticated Key Agreement (AKA) Scheme Resistant to Key Compromise Impersonation Attack for TMIS
|
# |
1403 - 04 |
Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains
|
10.1145/3618302 |
1402 - 09 |
A new code-based digital signature based on the McEliece cryptosystem
|
10.1049/cmu2.12607 |
1402 - 09 |
Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix
|
# |
1402 - 08 |
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks
|
10.22042/isecure.2023.180857 |
1402 - 08 |
ECCPWS: An ECC-based protocol for WBAN systems
|
10.1016/j.comnet.2023.109598 |
1402 - 01 |
Efficient chameleon hash functions in the enhanced collision resistant model
|
10.1016/j.ins.2019.09.001 |
1398 - 11 |
Short tightly secure signatures for signing a vector of group elements: A new approach
|
10.1016/j.tcs.2019.07.001 |
1398 - 08 |
Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model
|
10.1049/iet-ifs.2018.5063 |
1398 - 06 |
Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan's Scheme from Wireless Personal Communications (2018)
|
10.1093/comjnl/bxz041 |
1398 - 05 |
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
|
10.1007/s10207-019-00430-5 |
1397 - 12 |
Universal designated verifier signature scheme with non-delegatability in the standard model
|
10.1016/j.ins.2018.12.020 |
1397 - 11 |
Impossible Differential Cryptanalysis of 3D Block Cipher
|
# |
1395 - 07 |
Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers
|
10.1002/sec.1375 |
1394 - 10 |
Non-isomorphic biclique cryptanalysis of full-round Crypton
|
# |
1394 - 06 |
Primitives Based on Jumping LFSRs with Determined Period
|
# |
1394 - 04 |
Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions
|
# |
1394 - 01 |
New secure channel coding scheme based on randomly punctured quasi-cyclic-low density parity check codes
|
# |
1393 - 06 |