Results 1-10 of 14 (Search time: 0.012 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Generic security-amplifying methods of ordinary digital signatures Li, Jin; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjo; Wong, Duncan S., INFORMATION SCIENCES, v.201, pp.128 - 139, 2012-10 | |
Discrete logarithm based chameleon hashing and signatures without key exposure Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Kim, Kwangjo, COMPUTERS ELECTRICAL ENGINEERING, v.37, no.4, pp.614 - 623, 2011-07 | |
ID-based distributed "magic ink" signature from pairings Xie, Yan; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2836, pp.249 - 259, 2003 | |
Efficient ID-based blind signature and proxy signature from bilinear pairings Zhang, Fangguo; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2727, pp.312 - 323, 2003 | |
ID-based, blind signature and ring signature from pairings Zhang, Fangguo; Kim, Kwangjo, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2501, pp.533 - 547, 2002 | |
Identity-based chameleon hashing and signatures without key exposure Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Tian, Haibo; Li, Jin; Kim, Kwangjo, INFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05 | |
Compact representation of domain parameters of hyperelliptic curve cryptosystems Zhang, Fangguo; Liu, Shengli; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2384, pp.203 - 213, 2002-06 | |
ID-Based Blind Signature and Ring Signature from Pairings Zhang, Fangguo; Kim, Kwangjo, Lecture Notes in Computer Science, Vol.2501, pp.629-637, 2002 | |
New ID-based threshold signature scheme from bilinear pairings Chen, Xiaofeng; Zhang, Fangguo; Konidala, Divyan M; Kim, Kwangjo, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3348, pp.371 - 383, 2004 | |
Cryptanalysis of Lee-Hwang-Lis key authentication scheme Zhang, Fangguo; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.161, pp.101 - 107, 2005-02 |
Discover