Author of the publication

Cryptanalysis of Some Proxy Signature Schemes Without Certificates.

, , and . WISTP, volume 4462 of Lecture Notes in Computer Science, page 115-126. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Mediated Certificateless Signatures., , , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 459-477. Springer, (2007)Parallelizable MAC revisited., , , and . Secur. Commun. Networks, 7 (7): 1115-1127 (2014)Special issue on neural computing and applications 2021., , , , , and . Neural Comput. Appl., 34 (19): 16169-16171 (2022)An improved preimage attack against HAVAL-3., , and . Inf. Process. Lett., 115 (2): 386-393 (2015)Cryptanalysis of a CP-ABE scheme with policy in normal forms., and . Inf. Process. Lett., 116 (7): 492-495 (2016)Cancellable speech template via random binary orthogonal matrices projection hashing., , , , , , and . Pattern Recognit., (2018)Area-Time-Efficient Code-Based Postquantum Key Encapsulation Mechanism on FPGA., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 28 (12): 2672-2684 (2020)Cryptanalysis of genetic algorithm-based encryption scheme., , , , and . Multim. Tools Appl., 79 (35-36): 25259-25276 (2020)Performance Analysis of an Fuzzy Logic Based LEACH Protocol., , and . ICSCA, page 33-37. ACM, (2019)Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher., , and . ACISP, volume 5594 of Lecture Notes in Computer Science, page 108-121. Springer, (2009)