{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T17:54:28Z","timestamp":1762019668673,"version":"build-2065373602"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/iscisc48546.2019.8985158","type":"proceedings-article","created":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T03:22:38Z","timestamp":1581045758000},"page":"67-71","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of a Certificateless Signcryption Scheme"],"prefix":"10.1109","author":[{"given":"Parvin","family":"Rastegari","sequence":"first","affiliation":[{"name":"Isfahan University of Technology,Department of Electrical and Computer Engineering,Isfahan,Iran,84156-83111"}]},{"given":"Mohammad","family":"Dakhilalian","sequence":"additional","affiliation":[{"name":"Isfahan University of Technology,Department of Electrical and Computer Engineering,Isfahan,Iran,84156-83111"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3554-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2016.7736460"},{"key":"ref12","first-page":"3","article-title":"An Efficient Certificateless Signcryption Scheme in the Standard Model","volume":"31","author":"rastegari","year":"2017","journal-title":"ISC International Journal of Information Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4995-4"},{"key":"ref14","article-title":"Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan's Scheme from Wireless Personal Communications","author":"rastegari","year":"2018","journal-title":"The Computer Journal"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.09.037"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.11.045"},{"key":"ref17","article-title":"Security Weaknesses in Two Certificateless Signcryption Schemes","author":"selvi","year":"0","journal-title":"IACR Cryptology EPrint Archive 2010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368364"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052234"},{"key":"ref6","article-title":"A Supplement to Liu et al.'s Sertificateless Signcryption Scheme in the Standard Model","author":"jin","year":"0","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.10.011"},{"key":"ref8","first-page":"597","article-title":"An Improved Certificateless Signcryption in the Standard Model","volume":"17","author":"cheng","year":"2015","journal-title":"IJ Network Security"},{"key":"ref7","article-title":"Toward Certificateless Signcryption Scheme Without Random Oracles","author":"xiong","year":"0","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref9","first-page":"199","article-title":"An Efficient Certificateless Signcryption in the Standard Model","author":"zheng","year":"0","journal-title":"Cloud Computing and Big Data Analysis (ICCCBDA) IEEE International Conference on"}],"event":{"name":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2019,8,28]]},"location":"Mashhad, Iran","end":{"date-parts":[[2019,8,29]]}},"container-title":["2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8966935\/8985137\/08985158.pdf?arnumber=8985158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:25:30Z","timestamp":1755800730000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8985158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iscisc48546.2019.8985158","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}