Efficient and provably-secure identity-based signatures and signcryption from bilinear maps (2005)
- Authors:
- USP affiliated author: BARRETO, PAULO SERGIO LICCIARDI MESSEDER - EP
- School: EP
- Subject: CRIPTOLOGIA
- Language: Inglês
- Imprenta:
- Publisher: Springer Verlag
- Place of publication: Berlin
- Date published: 2005
- Source:
- Título do periódico: Advances in Cryptology ASIACRYPT 2005
- Conference title: International Conference on the Theory and Application of Cryptology and Information Security
-
ABNT
BARRETO, Paulo Sérgio Licciardi Messeder et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. Advances in Cryptology ASIACRYPT 2005. Tradução . Berlin: Springer Verlag, 2005. . . Acesso em: 25 jun. 2022. -
APA
Barreto, P. S. L. M., Libert, B., McCullagh, N., & Quisquater, J. -J. (2005). Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Advances in Cryptology ASIACRYPT 2005. Berlin: Springer Verlag. -
NLM
Barreto PSLM, Libert B, McCullagh N, Quisquater J-J. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Advances in Cryptology ASIACRYPT 2005. Berlin: Springer Verlag; 2005. [citado 2022 jun. 25 ] -
Vancouver
Barreto PSLM, Libert B, McCullagh N, Quisquater J-J. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Advances in Cryptology ASIACRYPT 2005. Berlin: Springer Verlag; 2005. [citado 2022 jun. 25 ] - Whirlwind: a new cryptographic hash function
- Construção de parâmetros e algoritmos eficientes para criptossistemas pós-quânticos baseados em teoria dos códigos
- Quasi-dyadic CFS signatures
- Implementation of Multivariate Quadratic Quasigroup for Wireless Sensor Network
- Criptografia robusta e marcas d'água frágeis: construção e análise de algoritmos para localizar alterações em imagens digitais
- Providing integrity and authenticity in DICOM images: a novel approach
- Authentication watermarkings for binary images
- Attacking the JAVA virtual machine to capture critical user information
- Fast hashing onto pairing-friendly elliptic curves over ternary fields
- A family of implementation-friendly BN elliptic curves
How to cite
A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas