Li, Ruilin; Li, Chao; Su, Jinshu; Sun, Bing Security evaluation of MISTY structure with SPN round function. (English) Zbl 1364.94553 Comput. Math. Appl. 65, No. 9, 1264-1279 (2013). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Han, Jinguang; Susilo, Willy; Mu, Yi; Yan, Jun Efficient oblivious transfers with access control. (English) Zbl 1247.94035 Comput. Math. Appl. 63, No. 4, 827-837 (2012). MSC: 94A62 68M12 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Choi, Kyu Young; Park, Jong Hwan; Lee, Dong Hoon A new provably secure certificateless short signature scheme. (English) Zbl 1219.94078 Comput. Math. Appl. 61, No. 7, 1760-1768 (2011). MSC: 94A60 68P25 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi Provably secure server-aided verification signatures. (English) Zbl 1219.94083 Comput. Math. Appl. 61, No. 7, 1705-1723 (2011). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI Link
Hur, Junbeom; Park, Chanil; Yoon, Hyunsoo Chosen ciphertext secure authenticated group communication using identity-based signcryption. (English) Zbl 1198.94151 Comput. Math. Appl. 60, No. 2, 362-375 (2010). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Fan, Chun-I; Sun, Wei-Zhe; Huang, Vincent Shi-Ming Provably secure randomized blind signature scheme based on bilinear pairing. (English) Zbl 1198.94148 Comput. Math. Appl. 60, No. 2, 285-293 (2010). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Lin, Dai-Rui; Wang, Chih-I; Zhang, Zhi-Kai; Guan, D. J. A digital signature with multiple subliminal channels and its applications. (English) Zbl 1198.94156 Comput. Math. Appl. 60, No. 2, 276-284 (2010). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Ogiela, Marek R.; Ogiela, Urszula The use of mathematical linguistic methods in creating secret sharing threshold algorithms. (English) Zbl 1198.94160 Comput. Math. Appl. 60, No. 2, 267-271 (2010). MSC: 94A62 68T50 × Cite Format Result Cite Review PDF Full Text: DOI
Wang, Baocang; Hu, Yupu Quadratic compact knapsack public-key cryptosystem. (English) Zbl 1189.94049 Comput. Math. Appl. 59, No. 1, 194-206 (2010). MSC: 94A60 11T71 × Cite Format Result Cite Review PDF Full Text: DOI
Caballero-Gil, P.; Fúster-Sabater, A. A simple attack on some clock-controlled generators. (English) Zbl 1189.94043 Comput. Math. Appl. 58, No. 1, 179-188 (2009). MSC: 94A60 05C85 05C90 × Cite Format Result Cite Review PDF Full Text: DOI
Yu, Yong; Xu, Chunxiang; Zhang, Xiaosong; Liao, Yongjian Designated verifier proxy signature scheme without random oracles. (English) Zbl 1186.94480 Comput. Math. Appl. 57, No. 8, 1352-1364 (2009). MSC: 94A62 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Hernández Encinas, L.; Muñoz Masqué, J.; Queiruga Dios, A. Safer parameters for the Chor-Rivest cryptosystem. (English) Zbl 1165.94320 Comput. Math. Appl. 56, No. 11, 2883-2886 (2008). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Juang, Wen-Shenq A practical anonymous payment scheme for electronic commerce. (English) Zbl 1048.94514 Comput. Math. Appl. 46, No. 12, 1787-1798 (2003). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Sun, Hung-Min; Chen, Bor-Liang Weighted decomposition construction for perfect secret sharing schemes. (English) Zbl 1002.94032 Comput. Math. Appl. 43, No. 6-7, 877-887 (2002). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Smart, N. P. A comparison of different finite fields for elliptic curve cryptosystems. (English) Zbl 0994.94024 Comput. Math. Appl. 42, No. 1-2, 91-100 (2001). Reviewer: Jan Camenisch (Rüschlikon) MSC: 94A60 14G50 × Cite Format Result Cite Review PDF Full Text: DOI
Sun, Hung-Min; Shieh, Shiuh-Pyng Recursive constructions for perfect secret sharing schemes. (English) Zbl 0935.94025 Comput. Math. Appl. 37, No. 3, 87-96 (1999). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Sun, Hung-Min; Shieh, Shiuh-Pyng Secret sharing schemes for graph-based prohibited structures. (English) Zbl 0935.94024 Comput. Math. Appl. 36, No. 7, 131-140 (1998). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Al Jabri, A. Kh. Shrinking generators and statistical leakage. (English) Zbl 0858.65006 Comput. Math. Appl. 32, No. 4, 33-39 (1996). MSC: 65C10 62M20 11K45 × Cite Format Result Cite Review PDF Full Text: DOI
Sun, Hung-Min; Shieh, Shiuh-Pyng An efficient construction of perfect secret sharing schemes for graph-based structures. (English) Zbl 0851.94022 Comput. Math. Appl. 31, No. 7, 129-135 (1996). MSC: 94A60 68P25 05C90 × Cite Format Result Cite Review PDF Full Text: DOI