References
- Zheng, Y., 'Digital signcryption or how to achieve cost(signature & encryption) << cost(signature) + cost (encryption),' CRYPTO '97, LNCS Vol.1294, pp.165-179, Springer-Verlag, 1997
- Zheng, Y., 'Signcryption and its applications in efficient public key solutions,' Information Security Workshop (ISW '97), LNCS Vol.1397, pp.291-312, Springer-Verlag, 1998
- Petersen, H. and Michels, M., 'Cryptanalysis and improvement of signcryption schemes,' IEE Proceeding - Computers and Digital Techniques, Vol.145, No.2, pp. 149-151, 1998 https://doi.org/10.1049/ip-cdt:19981862
- Nyberg, K. and Rueppel, R. A., 'Message recovery for signature schemes based on the discrete logarithm problem,' Eurocrypt '94, LNCS Vol.950, pp. 182-193, Springer-Verlag, 1995 https://doi.org/10.1007/BFb0053434
- Horster, P., Michels, M. and Petersen, H., 'Authenticated encryption schemes with low communication costs,' Electronics Letters, Vol.30, No.15, pp.1212-1213, 1994 https://doi.org/10.1049/el:19940856
- Lee, W.-B. and Chang, C.-C., 'Authenticated encryption scheme without using a on way function,' Electronics Letters, Vol.31, No.19, pp.1656-1657, 1995 https://doi.org/10.1049/el:19951167
- He, W.-H. and Wu, T.-C., 'Cryptanalysis and improvement of Petersen-Michels signcryption scheme,' IEE Proceedings - Computers and Digital Techniques, Vol.146, No.2, pp.123-124, 1999 https://doi.org/10.1049/ip-cdt:19990198
- ElGamal, T., 'A public key crytosystem and a signature scheme based on discrete logarithms,' IEEE Transactions on Information Theory, Vol.IT-31, No.4, pp469-472, 1985 https://doi.org/10.1109/TIT.1985.1057074
- Bao, F. and Deng, R. H., 'A signcryption scheme with signature directly verifiabe by public key,' PKC '98, LNCS Vol.1431, pp.55-59, Spriger-Verlg, 1998 https://doi.org/10.1007/BFb0054014
- Gamage, C., Leiwo, J. andZheng, Y., 'Encrypted message authentication by firewalls,' PKC '99, LNCS Vol.1560, pp.69-81, Springer-Verlag, 1999
- Horster, P., Petersen, H. and Michels, M., 'Meta-ElGamal signature schemes,' Proceedings of the second ACM conference on computer and communications security, pp.96-107, 1994 https://doi.org/10.1145/191177.191197
- Horster, P., Michels, M. and Petersen, H., 'Meta-message recovery and meta-blind signature schemes based on the discrete logarithm problem and their applications,' Asiacrypt '94, LNCS Vol.917, pp.224-237, Springer-Verlag, 1995 https://doi.org/10.1007/BFb0000437
- National Bureau of Standards, 'Data Encryption Standard,' Federal Information Processing Standards Publication FIPS PUB 46, 1977
- Lai, X., Massey, J. and Murphy, S. 'Markov ciphers and differential cryptanalysis,' Eurocrypt '91, LNCS Vol.547, pp.17-38, Springer-Verlag, 1991
- Brickell, E. F., Gordon, D. M., McCurley, K. S., and Wilson, D. B., 'Fast exponentiation with precomputation,' Eurocrypt '92, LNCS Vol.658, pp.200-207, Springer-Verlag, 1993
- de Rooij, P., 'Efficient exponentiation using precomputation and vector addition chains,' Eurocrypt '94, LNCS Vol.950, pp.389-399, Springer-Verlag, 1995 https://doi.org/10.1007/BFb0053453
- Lim, C. H. and Lee, P. J., 'More flexible exponentiation with precomputation,' CRYPTO '94, LNCS Vol.839, pp. 95-107, Springer-Verlag, 1994
- Knuth, D. E., Seminumerical Algorithms, 2nd Ed., The Art of Computer Programming, Vol.2, Addison-Wesley, Reading, Massachusetts, 1981
- Bos, J. and Coster, M., 'Addition chain heuristics,' CRYPTO '89, LNCS Vol.435, pp.400-407, Springer-Verlag, 1990