Sunder Lal

According to our database1, Sunder Lal authored at least 33 papers between 2003 and 2011.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2011
An efficient identity based generalized signcryption scheme.
Theor. Comput. Sci., 2011

Identity based signcryption schemes without random oracles.
IACR Cryptol. ePrint Arch., 2011

Efficient Identity Based Public Verifiable Signcryption Scheme
CoRR, 2011

2010
Efficient Generalized Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2010

2009
Anonymous ID Based Signcryption Scheme for Multiple Receivers.
IACR Cryptol. ePrint Arch., 2009

Generalization of Barreto et al ID based Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2009

An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme
CoRR, 2009

Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups
CoRR, 2009

Identity Based Strong Designated Verifier Parallel Multi-Proxy Signature Scheme
CoRR, 2009

2008
An Authenticated Key Agreement Protocol Using Conjugacy Problem in Braid Groups.
Int. J. Netw. Secur., 2008

Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes.
IACR Cryptol. ePrint Arch., 2008

ID based generalized signcryption.
IACR Cryptol. ePrint Arch., 2008

Multi-PKG ID based signcryption.
IACR Cryptol. ePrint Arch., 2008

An Identity Based Strong Bi-Designated Verifier (t, n) Threshold Proxy Signature Scheme
CoRR, 2008

2007
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings.
Int. J. Netw. Secur., 2007

Some Identity Based Strong Bi-Designated Verifier Signature Schemes.
IACR Cryptol. ePrint Arch., 2007

Remarks on IBE Scheme of Wang and Cao.
IACR Cryptol. ePrint Arch., 2007

Security Proof for Shengbao Wang's Identity-Based Encryption Scheme.
IACR Cryptol. ePrint Arch., 2007

An Improved Remote User Authentication Scheme using Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2007

New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings
CoRR, 2007

2006
Identity Based Strong Designated Verifier Proxy Signature Schemes.
IACR Cryptol. ePrint Arch., 2006

2005
Authentication Schemes Using Braid Groups
CoRR, 2005

An Efficient Scheme for Sensitive Message Transmission using Blind Signcryption
CoRR, 2005

A Multi-proxy Signature Scheme for Partial delegation with Warrant
CoRR, 2005

2004
An enhanced remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2004

Security Analysis of A Dynamic ID-based Remote User Authentication Scheme.
IACR Cryptol. ePrint Arch., 2004

A Directed Threshold - Signature Scheme
CoRR, 2004

A New Proxy Ring Signature Scheme
CoRR, 2004

Some Applications of Directed Signature Scheme
CoRR, 2004

A Directed Signature Scheme and its Applications
CoRR, 2004

2003
A remote user authentication scheme using smart cards with forward secrecy.
IEEE Trans. Consumer Electron., 2003

A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures.
IACR Cryptol. ePrint Arch., 2003

Proxy Blind Signature Scheme.
IACR Cryptol. ePrint Arch., 2003


  Loading...