SIGNCRYPTION ANALYZE
Laura Savu ()
Additional contact information
Laura Savu: University of Buchares
Journal of Information Systems & Operations Management, 2011, vol. 5, issue 2, 325-334
Abstract:
The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extensions for the signcryption scheme and discusses the security in signcryption. The main contribution to this paper represents the implementation of the signcryption algorithm with the examples provided.
Keywords: ElGamal; elliptic curves; encryption; identity-based; proxy-signcryption; public key; ring-signcryption; RSA; signcryption (search for similar items in EconPapers)
Date: 2011
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://www.rebe.rau.ro/RePEc/rau/jisomg/WI11/JISOM-WI11-A12.pdf (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:rau:jisomg:v:5:y:2011:i:2:p:325-334
Access Statistics for this article
More articles in Journal of Information Systems & Operations Management from Romanian-American University Contact information at EDIRC.
Bibliographic data for series maintained by Alex Tabusca ().