2012
DOI: 10.1007/978-3-642-30111-7_68
|View full text |Cite
|
Sign up to set email alerts
|

Formal Security Verification of Secured ECC Based Signcryption Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…The Table 4, is our proposed scheme shows the improvement over Basu et al [35] and its related proposed schemes on elliptic curve point multiplication (ECPM), Multiplication MUL and addition ADD.…”
Section: Phase 1: Setup Phasementioning
confidence: 85%
“…The Table 4, is our proposed scheme shows the improvement over Basu et al [35] and its related proposed schemes on elliptic curve point multiplication (ECPM), Multiplication MUL and addition ADD.…”
Section: Phase 1: Setup Phasementioning
confidence: 85%
“…Formal Security Analysis using AVISPA Tool. Recently, AVISPA tool [25] is widely used by many researchers [29,30,31] for the automated validation of Internet security protocols and applications. The AVISPA is a pushbutton tool designed by University of Geneva, Italy using the concept of Dolev and Yao intruder model [32], where the network is controlled by an intruder (Active and passive); however he is not allowed to crack the underlying cryptography.…”
Section: 2mentioning
confidence: 99%