Results 1-10 of 11 (Search time: 0.002 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
ID-based distributed "magic ink" signature from pairings Xie, Yan; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2836, pp.249 - 259, 2003 | |
Efficient ID-based blind signature and proxy signature from bilinear pairings Zhang, Fangguo; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2727, pp.312 - 323, 2003 | |
ID-based, blind signature and ring signature from pairings Zhang, Fangguo; Kim, Kwangjo, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2501, pp.533 - 547, 2002 | |
Compact representation of domain parameters of hyperelliptic curve cryptosystems Zhang, Fangguo; Liu, Shengli; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2384, pp.203 - 213, 2002-06 | |
ID-Based Blind Signature and Ring Signature from Pairings Zhang, Fangguo; Kim, Kwangjo, Lecture Notes in Computer Science, Vol.2501, pp.629-637, 2002 | |
New ID-based threshold signature scheme from bilinear pairings Chen, Xiaofeng; Zhang, Fangguo; Konidala, Divyan M; Kim, Kwangjo, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3348, pp.371 - 383, 2004 | |
Cryptanalysis of Lee-Hwang-Lis key authentication scheme Zhang, Fangguo; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.161, pp.101 - 107, 2005-02 | |
Efficient generic on-line/off-line (threshold) signatures without key exposure Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Susilo, Willy; Mu, Yi; Lee, Hyunrok; Kim, Kwangjo, INFORMATION SCIENCES, v.178, no.21, pp.4192 - 4203, 2008-11 | |
A universal forgery on Araki et al.s convertible limited verifier signature scheme Zhang, Fangguo; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E86A, pp.515 - 516, 2003-02 | |
Chameleon hashing without key exposure Chen, Xiaofeng; Zhang, Fangguo; Kim, Kwangjo, INFORMATION SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3225, pp.87 - 98, 2004 |
Discover