References
- Diffie , W. and Hellman , M. E. (1976) . New directions in cryptography . IEEE Transactions on Information Theory , IT-22 ( 6 ) : 644 – 654 .
- Nyberg K. Rueppel R. A. (1993) A new signature scheme based on the DSA giving message recovery In: 1st ACM Conf. on Computer and Communication Security pp. 58–61
- Nyberg K. Rueppel R. A. (1995) Message recovery for signature schemes based on the discrete logarithm problem In: Proc. of Eurocrypt’94 LNCS 950 pp. 182–193
- Horster , P. , Michels , M. and Petersen , H. (1994) . Authenticated encryption schemes with low communication costs . Electronics Letters , 30 ( 15 ) : 1230 – 1231 .
- Lee , W. B. and Chang , C. C. (1995) . Authenticated encryption scheme without using a one-way function . Electronics Letters , 31 ( 19 ) : 1656 – 1657 .
- Chen , K. (1998) . Signature with message recovery . Electronics Letters , 34 ( 20 ) : 1934
- Mitchell , C. J. and Yeun , C. Y. (1999) . Comment – signature with message recovery . Electronics Letters , 35 ( 3 ) : 217
- Jakobsson M. Sako K. Impagliazzo R. (1996) Designated verifier proofs and their applications In: Proc. of Eurocrypt’96 LNCS 1070 pp. 143–154
- Zhou J. Lam K. Y. (1999) Securing digital signatures for non-repudiation Computer Communications Vol. 22 No. 8 Elsevier pp. 710–716
- Stinson D. R. (1995) Cryptography: Theory and Practice CRC Press