IoT-friendly certificateless signcryption schemes: Introducing a provably secure scheme in ROM
|
10.1016/j.jisa.2025.103979
|
1403 - 12
|
|
On Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles: Cryptanalysis and Improvements
|
10.1109/ACCESS.2024.3488570
|
1403 - 08
|
|
ECKCI: An ECC-Based Authenticated Key Agreement (AKA) Scheme Resistant to Key Compromise Impersonation Attack for TMIS
|
#
|
1403 - 04
|
|
Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains
|
10.1145/3618302
|
1402 - 09
|
|
A new code-based digital signature based on the McEliece cryptosystem
|
10.1049/cmu2.12607
|
1402 - 09
|
|
Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix
|
#
|
1402 - 08
|
|
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks
|
10.22042/isecure.2023.180857
|
1402 - 08
|
|
ECCPWS: An ECC-based protocol for WBAN systems
|
10.1016/j.comnet.2023.109598
|
1402 - 01
|
|
Efficient chameleon hash functions in the enhanced collision resistant model
|
10.1016/j.ins.2019.09.001
|
1398 - 11
|
|
Short tightly secure signatures for signing a vector of group elements: A new approach
|
10.1016/j.tcs.2019.07.001
|
1398 - 08
|
|
Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model
|
10.1049/iet-ifs.2018.5063
|
1398 - 06
|
|
Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan's Scheme from Wireless Personal Communications (2018)
|
10.1093/comjnl/bxz041
|
1398 - 05
|
|
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
|
10.1007/s10207-019-00430-5
|
1397 - 12
|
|
Universal designated verifier signature scheme with non-delegatability in the standard model
|
10.1016/j.ins.2018.12.020
|
1397 - 11
|
|
Impossible Differential Cryptanalysis of 3D Block Cipher
|
#
|
1395 - 07
|
|
Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers
|
10.1002/sec.1375
|
1394 - 10
|
|
Non-isomorphic biclique cryptanalysis of full-round Crypton
|
#
|
1394 - 06
|
|
Primitives Based on Jumping LFSRs with Determined Period
|
#
|
1394 - 04
|
|
Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions
|
#
|
1394 - 01
|
|
New secure channel coding scheme based on randomly punctured quasi-cyclic-low density parity check codes
|
#
|
1393 - 06
|
|