Sahadeo Padhye
TitleCited byYear
An efficient certificateless two-party authenticated key agreement protocol
D He, S Padhye, J Chen
Computers & Mathematics with Applications 64 (6), 1914-1926, 2012
602012
Provable secure identity‐based multi‐proxy signature scheme
RA Sahu, S Padhye
International Journal of Communication Systems 28 (3), 497-512, 2015
202015
ECDLP‐based certificateless proxy signature scheme with message recovery
S Padhye, N Tiwari
Transactions on Emerging Telecommunications Technologies 26 (3), 346-354, 2015
182015
Efficient ID-based multiproxy multisignature without bilinear maps in ROM
N Tiwari, S Padhye, D He
annals of telecommunications-annales des télécommunications 68 (3-4), 231-237, 2013
132013
An ID-based multi-proxy multi-signature scheme
RA Sahu, S Padhye
2010 International Conference on Computer and Communication Technology …, 2010
122010
Provable secure proxy signature scheme without bilinear pairings
N Tiwari, S Padhye
International Journal of Communication Systems 26 (5), 644-650, 2013
112013
Identity‐based multi‐proxy multi‐signature scheme provably secure in random oracle model
RA Sahu, S Padhye
Transactions on Emerging Telecommunications Technologies 26 (4), 547-558, 2015
102015
On DRSA Public Key Cryptosystem.
S Padhye
Int. Arab J. Inf. Technol. 3 (4), 334-336, 2006
102006
Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key.
N Ojha, S Padhye
IJ Network Security 16 (1), 53-57, 2014
92014
Generalisations of NTRU cryptosystem
S Singh, S Padhye
Security and Communication Networks 9 (18), 6315-6334, 2016
72016
An ID-based proxy multi signature scheme without bilinear pairings
N Tiwari, S Padhye
International Conference on Security Aspects in Information Technology, 83-92, 2011
72011
A Public Key Cryptosystem Based on Pell Equation.
S Padhye
IACR Cryptology ePrint Archive 2006, 191, 2006
72006
Analysis on the generalization of proxy signature
N Tiwari, S Padhye
Security and Communication Networks 6 (5), 549-566, 2013
62013
Efficient ID-based proxy multi-signature scheme secure in random oracle
RA Sahu, S Padhye
Frontiers of Computer Science 6 (4), 421-428, 2012
62012
Efficient ID-Based Multi-proxy Signature Scheme from Bilinear Pairing Based on k-plus Problem
S Mishra, RA Sahu, S Padhye, RS Yadav
International Conference on Integrated Computing Technology, 113-122, 2011
62011
Efficient ID-based multi-proxy multi-signature scheme based on CDHP
RA Sahu, S Padhye
Journal of Applied Mathemtics and Informatics 5 (4), 275-282, 2011
62011
Partial known plaintext attack on Koyama scheme
S Padhye
Information processing letters 96 (3), 96-100, 2005
62005
Provable Secure Multi-Proxy Signature Scheme without Bilinear Maps.
N Tiwari, S Padhye
IJ Network Security 17 (6), 736-742, 2015
52015
New proxy signature scheme with message recovery using verifiable self-certified public keys
N Tiwari, S Padhye
2011 2nd International Conference on Computer and Communication Technology …, 2011
52011
ID-based signature schemes from bilinear pairing: A survey
RA Sahu, S Padhye
Frontiers of Electrical and Electronic Engineering in China 6 (4), 487-500, 2011
42011
The system can't perform the operation now. Try again later.
Articles 1–20