共 8 条
[1]
BAEK J, 2002, LECT NOTES COMPUTER, V2274, P80, DOI DOI 10.1007/S00145-007-0211_0
[2]
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[3]
Libert B, 2005, LECT NOTES COMPUT SC, V3352, P220
[4]
Libert B, 2004, LECT NOTES COMPUT SC, V2947, P187
[5]
Security analysis of signcryption scheme from q-Diffie-Hellman problems
[J].
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES,
2006, E89A (01)
:206-208
[6]
On the security of signcryption scheme with key privacy
[J].
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES,
2005, E88A (04)
:1093-1095
[7]
Yang GM, 2005, LECT NOTES COMPUT SC, V3650, P218
[8]
Zheng YL, 1997, LECT NOTES COMPUT SC, V1294, P165