EconPapers    
Economics at your fingertips  
 

SIGNCRYPTION ANALYZE

Laura Savu ()
Additional contact information
Laura Savu: Department Computer Science – Information Security,University of Bucharest, Faculty of Mathematics and Computer Science ,Str. Academiei nr.14, sector 1, C.P. 010014, Bucuresti, Romania

Journal of Information Systems & Operations Management, 2012, vol. 6, issue 1, 87-96

Abstract: The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extensions for the signcryption scheme and discusses the security in signcryption. The main contribution to this paper represents the implementation of the signcryption algorithm with the examples provided.

Keywords: ElGamal; elliptic curves; encryption; identity-based; proxy-signcryption; public key; ring-signcryption; RSA; signcryption. (search for similar items in EconPapers)
Date: 2012
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://www.rebe.rau.ro/RePEc/rau/jisomg/SP12/JISOM-SP12-A9.pdf (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:rau:jisomg:v:6:y:2012:i:1:p:87-96

Access Statistics for this article

More articles in Journal of Information Systems & Operations Management from Romanian-American University Contact information at EDIRC.
Bibliographic data for series maintained by Alex Tabusca ().

 
Page updated 2025-11-29
Handle: RePEc:rau:jisomg:v:6:y:2012:i:1:p:87-96