{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T16:51:09Z","timestamp":1758991869406,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642163418"},{"type":"electronic","value":"9783642163425"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16342-5_6","type":"book-chapter","created":{"date-parts":[[2010,11,16]],"date-time":"2010-11-16T12:29:50Z","timestamp":1289910590000},"page":"75-92","source":"Crossref","is-referenced-by-count":15,"title":["Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing"],"prefix":"10.1007","author":[{"given":"S. Sharmila Deva","family":"Selvi","sequence":"first","affiliation":[]},{"given":"S. Sree","family":"Vivek","sequence":"additional","affiliation":[]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Aranha, D., Castro, R., Lopez, J., Dahab, R.: Efficient certificateless signcryption, http:\/\/sbseg2008.inf.ufrgs.br\/proceedings\/data\/pdf\/st03_01_resumo.pdf","DOI":"10.5753\/sbseg_estendido.2008.20905"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1145\/1368310.1368364","volume-title":"ACM Symposium on Information, Computer and Communications Security - ASIACCS 2008","author":"M. Barbosa","year":"2008","unstructured":"Barbosa, M., Farshim, P.: Certificateless signcryption. In: ACM Symposium on Information, Computer and Communications Security - ASIACCS 2008, pp. 369\u2013372. ACM, New York (2008)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Barreto, P.S.L.M., Deusajute, A.M., de Souza Cruz, E., Pereira, G.C.F., da Silva, R.R.: Toward efficient certificateless signcryption from (and without) bilinear pairings, http:\/\/sbseg2008.inf.ufrgs.br\/proceedings\/data\/pdf\/st03_03_artigo.pdf","DOI":"10.5753\/sbseg.2008.20892"},{"key":"6_CR4","unstructured":"Dutta, R., Barua, R., Sarkar, P.: Pairing-based cryptographic protocols: A survey (2004), Cryptology ePrint Archive, Report 2004\/064, http:\/\/eprint.iacr.org\/"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-540-76969-9_13","volume-title":"Cryptology and Network Security","author":"Y. Sun","year":"2007","unstructured":"Sun, Y., Zhang, F., Baek, J.: Strongly secure certificateless public key encryption without pairing. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol.\u00a04856, pp. 194\u2013208. Springer, Heidelberg (2007)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Wu, C., Chen, Z.: A new efficient certificateless signcryption scheme. In: IEEE, International Symposium on Information Science and Engieering, ISISE 2008, vol.\u00a01, pp. 661\u2013664 (2008)","DOI":"10.1109\/ISISE.2008.206"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16342-5_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T21:39:14Z","timestamp":1740692354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16342-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642163418","9783642163425"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16342-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}