共 20 条
[1]
Certificateless KEM and hybrid signcryption schemes revisited. Selvi S,Vivek S,Rangan C. Proc.of the Information Security,Practice and Experience 2010 . 2010
[2]
Certificateless signcryption scheme in the standard model[J] . Zhenhua Liu,Yupu Hu,Xiangsong Zhang,Hua Ma.  Information Sciences . 2009 (3)
[3]
Cryptanalysis of a certificateless signcryption scheme in the standard model[J] . Jian Weng,Guoxiang Yao,Robert H. Deng,Min-Rong Chen,Xiangxue Li.  Information Sciences . 2010 (3)
[4]
On security of a certificateless signcryption scheme[J] . Songqin Miao,Futai Zhang,Sujuan Li,Yi Mu.  Information Sciences . 2011
[5]
Further improvement of an identity-based signcryption scheme in the standard model[J] . Fagen Li,Yongjian Liao,Zhiguang Qin,Tsuyoshi Takagi.  Computers and Electrical Engineering . 2011 (2)
[6]
ID-based signcryption KEM to multiple recipients. Sun, Yinxia,Li, Hui. The Chinese Journal . 2011
[7]
Certificateless signcryption scheme without bilinear pairing. Liu, Wen-Hao,Xu, Chun-Xiang. Ruan Jian Xue Bao/Journal of Software . 2011