Authenticated Diffie-Hellman key agreement protocol with forward secrecy Chuanrong ZhangYuqing Zhang OriginalPaper 08 November 2008 Pages: 641 - 644
A deniable authenticated key agreement protocol Haibo TianXiaofeng ChenBaodian Wei OriginalPaper 08 November 2008 Pages: 645 - 650
Instantiate random oracles in OAEP with pseudorandom functions Xiaoying JiaHongda LiBao Li OriginalPaper 08 November 2008 Pages: 651 - 656
Secure proxy re-encryption from CBE to IBE Yan ChenFutai Zhang OriginalPaper 08 November 2008 Pages: 657 - 661
Efficient hierarchical identity based signature scheme in the standard model Yanli RenDawu Gu OriginalPaper 08 November 2008 Pages: 665 - 669
An efficient identity-based anonymous signcryption scheme Yong YuFagen LiYing Sun OriginalPaper 08 November 2008 Pages: 670 - 674
An improved sanitizable signature scheme Shangping WangJian WangYaling Zhang OriginalPaper 08 November 2008 Pages: 675 - 679
A group-oriented (t,n) threshold signature scheme with traceable signers Zuowen Tan OriginalPaper 08 November 2008 Pages: 680 - 684
Universal designated multi verifier signature scheme without random oracles Yang MingYumin Wang OriginalPaper 08 November 2008 Pages: 685 - 691
A practical identity-based signature scheme Chenghua LiJianxin ZhuQian Deng OriginalPaper 08 November 2008 Pages: 692 - 696
An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis Jia ChenDongyue XueXuejia Lai OriginalPaper 08 November 2008 Pages: 697 - 701
A class of rotation symmetric Boolean functions with optimum algebraic immunity Chunlei LiXiangyong ZengLei Hu OriginalPaper 08 November 2008 Pages: 702 - 706
On the largest linear span of binary sequences with period p 2 from interleaved construction Shenghua LiXiangyong ZengLei Hu OriginalPaper 08 November 2008 Pages: 707 - 711
Analysis of the design methods of word oriented linear feedback shift registers Guang ZengWenbao HanKaicheng He OriginalPaper 08 November 2008 Pages: 712 - 716
Efficient scalar multiplication for elliptic curves over binary fields Haihua GuDawu GuYa Liu OriginalPaper 08 November 2008 Pages: 717 - 720
A new certificateless public key encryption scheme Yan ChenFutai Zhang OriginalPaper 08 November 2008 Pages: 721 - 726
Cycling attacks against homomorphic cryptosystems Lin WangMaozhi XuZhihong Yue OriginalPaper 08 November 2008 Pages: 727 - 732
Efficient privacy enhanced software registration with ID-based blind signatures Wuping ChenBo QinHuanguo Zhang OriginalPaper 08 November 2008 Pages: 733 - 738
A new secure password authentication scheme using smart cards Bangju WangYuhua WangHuanguo Zhang OriginalPaper 08 November 2008 Pages: 739 - 743
A general pairwise key predistribution scheme for wireless sensor networks Xiaoyu DingZhiping LiuDingrong Shao OriginalPaper 08 November 2008 Pages: 744 - 748
Research on transferable off-line electronic cash system Yichun Liu OriginalPaper 08 November 2008 Pages: 749 - 752
A geometric robust watermarking algorithm based on DWT-DCT and Zernike moments Yu ChenFang QuZhong Chen OriginalPaper 08 November 2008 Pages: 753 - 758
The multireceiver commitment schemes Shuhong WangZhifeng Qi OriginalPaper 08 November 2008 Pages: 759 - 764
Trust calculation and delivery control in trust-based access control Jianyun LeiGuohua CuiGuanglin Xing OriginalPaper 08 November 2008 Pages: 765 - 768