{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T18:06:48Z","timestamp":1767895608779,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.23919\/icitst.2017.8356343","type":"proceedings-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T19:01:01Z","timestamp":1525978861000},"page":"43-47","source":"Crossref","is-referenced-by-count":8,"title":["Lightweight signcryption scheme based on discrete Chebyshev maps"],"prefix":"10.23919","author":[{"given":"Ta Thi Kim","family":"Hue","sequence":"first","affiliation":[]},{"given":"Thang Manh","family":"Hoang","sequence":"additional","affiliation":[]},{"given":"An","family":"Braeken","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"521","author":"wang","year":"2015","journal-title":"Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-012-4635-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.10.011"},{"key":"ref13","first-page":"321","author":"matsuda","year":"2009","journal-title":"Efficient Constructions of Signcryption Schemes and Signcryption Composability"},{"key":"ref14","first-page":"123","author":"wang","year":"2004","journal-title":"Security Analysis of Two Signcryption Schemes"},{"key":"ref15","first-page":"308","author":"steinfeld","year":"2000","journal-title":"A Signcryption Scheme Based on Integer Factorization"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.09.037"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.11.045"},{"key":"ref18","first-page":"1","article-title":"Crypt-analysis of a signcryption scheme with fast online signing and short signcryptext","volume":"57","author":"zhou","year":"2014","journal-title":"Science China Information Sciences"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20542-2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_13"},{"key":"ref27","author":"hankerson","year":"2006","journal-title":"Guide to Elliptic Curve Cryptography"},{"key":"ref3","first-page":"450","article-title":"Present: An ultra-lightweight block cipher","author":"bogdanov","year":"2007","journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2007.378273"},{"key":"ref8","first-page":"165","author":"zheng","year":"1997","journal-title":"Digital signcryption or how to achieve cost (signature & encryption) < cost (signature) + cost (encryption)"},{"key":"ref7","first-page":"339","article-title":"Twine: A lightweight block cipher for multiple platforms","author":"suzaki","year":"2012","journal-title":"International Conference on Selected Areas in Cryptography"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.178"},{"key":"ref9","first-page":"291","author":"zheng","year":"1998","journal-title":"Signcryption and its applications in efficient public key solutions"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.01.006"},{"key":"ref20","author":"maze","year":"2003","journal-title":"Algebraic Methods for Constructing One-Way Trapdoor Functions"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9939-1964-0202968-3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2616876"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/7384.963463"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1142\/S021812741750033X"},{"key":"ref26","author":"nguyen","year":"2016","journal-title":"Lightweight Security Protocols for IP-based Wireless Sensor Networks and the Internet of Things"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1018-1"}],"event":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","location":"Cambridge","start":{"date-parts":[[2017,12,11]]},"end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8354335\/8356324\/08356343.pdf?arnumber=8356343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,28]],"date-time":"2018-05-28T20:24:17Z","timestamp":1527539057000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8356343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":27,"URL":"https:\/\/doi.org\/10.23919\/icitst.2017.8356343","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}