EconPapers    
Economics at your fingertips  
 

SIGNCRYPTION ANALYZE

Laura Savu ()
Additional contact information
Laura Savu: University of Buchares

Journal of Information Systems & Operations Management, 2011, vol. 5, issue 2, 325-334

Abstract: The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extensions for the signcryption scheme and discusses the security in signcryption. The main contribution to this paper represents the implementation of the signcryption algorithm with the examples provided.

Keywords: ElGamal; elliptic curves; encryption; identity-based; proxy-signcryption; public key; ring-signcryption; RSA; signcryption (search for similar items in EconPapers)
Date: 2011
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://www.rebe.rau.ro/RePEc/rau/jisomg/WI11/JISOM-WI11-A12.pdf (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:rau:jisomg:v:5:y:2011:i:2:p:325-334

Access Statistics for this article

More articles in Journal of Information Systems & Operations Management from Romanian-American University Contact information at EDIRC.
Bibliographic data for series maintained by Alex Tabusca ().

 
Page updated 2025-11-29
Handle: RePEc:rau:jisomg:v:5:y:2011:i:2:p:325-334