共 50 条
- [42] Key Replacement Attack on Two Certificateless Signature Schemes without Random Oracles ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 1606 - 1611
- [43] Security analysis of some threshold signature schemes and multi-signature schemes INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 233 - 241
- [47] Certificateless short proxy signature scheme Yuan, Y. (ymyuan@xmu.edu.cn), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
- [48] On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature Schemes EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 286 - 291
- [49] On the security of two threshold signature schemes with traceable signers APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 111 - 122
- [50] Study on Security Analysis and Efficient Imrovement of Certificateless Aggregate Signature Scheme PROCEEDINGS OF 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2020), 2020, : 343 - 346