共 50 条
- [42] New algorithm for the elliptic curve discrete logarithm problem with auxiliary inputs Applicable Algebra in Engineering, Communication and Computing, 2017, 28 : 99 - 108
- [43] A Fair-Exchange Protocol Based on Off-line Semi-Trusted Third Party INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 208 - 212
- [44] Nonrepudiable threshold proxy signature scheme based on elliptic curve cryptography Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2007, 42 (01): : 8 - 12
- [45] Security analysis of a proxy signature scheme based on the elliptic curve cryptosystem SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 58 - 64
- [46] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243
- [48] Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing The Journal of Supercomputing, 2023, 79 : 11261 - 11299
- [49] Two-party authenticated multiple-key agreement based on elliptic curve discrete logarithm problem International Journal of Smart Home, 2013, 7 (01): : 9 - 18
- [50] A new multi-proxy multi-signature scheme based on elliptic curve cryptography 2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 105 - 109