共 20 条
- [1] Certificateless KEM and hybrid signcryption schemes revisited. Selvi S,Vivek S,Rangan C. Proc.of the Information Security,Practice and Experience 2010 . 2010
- [2] Certificateless signcryption scheme in the standard model[J] . Zhenhua Liu,Yupu Hu,Xiangsong Zhang,Hua Ma.  Information Sciences . 2009 (3)
- [3] Cryptanalysis of a certificateless signcryption scheme in the standard model[J] . Jian Weng,Guoxiang Yao,Robert H. Deng,Min-Rong Chen,Xiangxue Li.  Information Sciences . 2010 (3)
- [4] On security of a certificateless signcryption scheme[J] . Songqin Miao,Futai Zhang,Sujuan Li,Yi Mu.  Information Sciences . 2011
- [5] Further improvement of an identity-based signcryption scheme in the standard model[J] . Fagen Li,Yongjian Liao,Zhiguang Qin,Tsuyoshi Takagi.  Computers and Electrical Engineering . 2011 (2)
- [6] ID-based signcryption KEM to multiple recipients. Sun, Yinxia,Li, Hui. The Chinese Journal . 2011
- [7] Certificateless signcryption scheme without bilinear pairing. Liu, Wen-Hao,Xu, Chun-Xiang. Ruan Jian Xue Bao/Journal of Software . 2011