@misc{signcryption,
    author =        "Y.~Zheng",
    title =         "Signcryption Central",
    year =          "2005",
	month =         "Janeiro",
    note =          "\url{http://www.signcryption.net}",
}

@misc{loon,
    author =        "Y.~Ng",
    title =         "Short Message Service (SMS) Security Solution for Mobile Devices",
    school =        "Naval Postgraduate School",
    address =       "Monterey, California, {USA}",
    year =          "2006",
    pages =         "17--19",
}

@Inproceedings{smsanalysis,
    author =        "W.~Enck and P.~Traynor and P.~McDaniel and T.~L.~Porta",
    title =         "Exploiting open functionality in SMS-capable cellular networks",
    booktitle =     "Proceedings of the 12th ACM conference on Computer and communications security",
    publisher =     "{ACM} Press",
    address =       "New York, NY, {USA}",
    year =          "2005",
    pages =         "393--404",
}

@Inproceedings{bdcps,
    author =        "P.~S.~L.~M.~Barreto and A.~Deusajute and E.~Cruz and G.~Pereira and R.~Silva",
    title =         "Toward Efficient Certificateless Signcryption from (and without) Bilinear Pairings",
    booktitle =     "Anais do VIII Simpósio Brasileiro em Segurança da Informação de Sistemas Computacionais",
    publisher =     "Sociedade Brasileira de Computação",
    address =       "Gramado, RS, Brasil",
    year =          "2008",
    pages =         "115--125",}

@Inproceedings{ssms,
    author =        "E.~Cruz and G.~Pereira and R.~Silva and P.~S.~L.~M.~Barreto",
    title =         "Construção de um Sistema de SMS Seguro",
    booktitle =     "Anais do VIII Simpósio Brasileiro em Segurança da Informação de Sistemas Computacionais",
    publisher =     "Sociedade Brasileira de Computação",
    address =       "Gramado, RS, Brasil",
    year =          "2008",
    pages =         "413--421",}}

@misc{rsalabs,
    author =        "B.~Kaliski",
    title =         "TWIRL and RSA Key Size",
    month =         "Maio",
    year =          "2003",
    note =          "\url{http://www.rsa.com/rsalabs/node.asp?id=2004}",
}

@misc{freeman-scott-teske,
    author =        "D.~Freeman and M.~Scott and E.~Teske",
    title =         "A Taxonomy of Pairing-Friendly Elliptic Curves",
    howpublished =  "{IACR} ePrint Archive, report 2006/372",
    year =          "2006",
    note =          "\url{http://eprint.iacr.org/2006/372}",
}

@Inproceedings{al-riyami-paterson,
    author =        "S.~S.~Al-Riyami and K.~G.~Paterson",
    title =         "Certificateless Public Key Cryptography",
    booktitle =     "Advanced in Cryptology -- Asiacrypt'2003",
    series =        "Lecture Notes in Computer Science",
    volume =        "2894",
    publisher =     "Springer",
    year =          "2003",
    pages =         "452--473",
}

@Inproceedings{baek-safavi-naini-susilo,
    author =        "J.~Baek and R.~Safavi-Naini and W.~Susilo",
    title =         "Certificateless Public Key Encryption Without Pairing",
    booktitle =     "Information Security Conference -- {ISC}'2005",
    series =        "Lecture Notes in Computer Science",
    volume =        "3650",
    publisher =     "Springer",
    year =          "2005",
    pages =         "134--148",
}

@Inproceedings{baek-steinfeld-zheng,
    author =        "J.~Baek and R.~Steinfeld and Y.~Zheng",
    title =         "Formal Proofs for the Security of Signcryption",
    booktitle =     "Public Key Cryptography -- {PKC}'2002",
    series =        "Lecture Notes in Computer Science",
    volume =        "2274",
    publisher =     "Springer",
    year =          "2002",
    pages =         "80--98",
}

@Inproceedings{barbosa-farshim,
    author =        "M.~Barbosa and P.~Farshim",
    title =         "Certificateless Signcryption",
    booktitle =     "{ACM} Symposium on Information, Computer and Communications Security -- {ASIACCS}'2008",
    address =       "Tokyo, Japan",
    series =        "Lecture Notes in Computer Science",
    publisher =     "Springer",
    year =          "2008",
    note =          "To appear",
}

@Inproceedings{barreto-libert-mccullagh-quisquater,
    author =        "P.~S.~L.~M.~Barreto and B.~Libert and N.~McCullagh and J.-J.~Quisquater",
    title =         "Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps",
    booktitle =     "Advanced in Cryptology -- Asiacrypt'2005",
    series =        "Lecture Notes in Computer Science",
    volume =        "3788",
    publisher =     "Springer",
    year =          "2005",
    pages =         "515--532",
}

@Inproceedings{barreto-naehrig,
    author =        "P.~S.~L.~M.~Barreto and M.~Naehrig",
    title =         "Pairing-Friendly Curves of Prime Order",
    booktitle =     "Selected Areas in Cryptography -- {SAC}'2005",
    series =        "Lecture Notes in Computer Science",
    volume =        "3897",
    publisher =     "Springer",
    year =          "2006",
    pages =         "319--331",
}

@Inproceedings{bellare-rogaway,
    author =        "M.~Bellare and P.~Rogaway",
    title =         "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols",
    booktitle =     "1st {ACM} Conference on Computer and Communications Security",
    publisher =     "{ACM} Press",
    address =       "Fairfax, {USA}",
    year =          "1993",
    pages =         "62--73",
}

@article{bentahar-farshim-malone-lee-smart,
    author =        "K.~Bentahar and P.~Farshim and J.~Malone-Lee and N.~P.~Smart",
    title =         "Generic Constructions of Identity-Based and Certificateless {KEM}s",
    journal =       "Journal of Cryptology",
    volume =        "21",
    number =        "2",
    year =          "2008",
    pages =         "178--199",
    publisher =     "Springer",
}

@Inproceedings{boneh-franklin,
    author =        "D.~Boneh and M.~Franklin",
    title =         "Identity-based encryption from the {Weil} pairing",
    booktitle =     "Advanced in Cryptology -- Crypto'2001",
    series =        "Lecture Notes in Computer Science",
    volume =        "2139",
    publisher =     "Springer",
    year =          "2001",
    pages =         "213--229",
}

@article{elgamal,
    author =        "T.~ElGamal",
    title =         "A public-key cryptosystem and a signature scheme based on discrete logarithms",
    journal =       "{IEEE} Transactions on Information Theory",
    volume =        "IT-31",
    number =        "4",
    year =          "1985",
    pages =         "469--472",
}

@Inproceedings{freeman,
    author =        "D.~Freeman",
    title =         "Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10",
    booktitle =     "Algorithmic Number Theory Symposium -- {ANTS-VII}",
    series =        "Lecture Notes in Computer Science",
    volume =        "4076",
    publisher =     "Springer",
    year =          "2006",
    pages =         "452--465",
}

@Inproceedings{fujisaki-okamoto,
    author =        "E.~Fujisaki and T.~Okamoto",
    title =         "Secure integration of asymmetric and symmetric encryption schemes",
    booktitle =     "Advanced in Cryptology -- Crypto'1999",
    series =        "Lecture Notes in Computer Science",
    volume =        "1666",
    publisher =     "Springer",
    year =          "1999",
    pages =         "537--554",
}

@misc{galbraith-lin-scott,
    author =        "S.~D.~Galbraith and X.~Lin and M.~Scott",
    title =         "Endomorphisms for faster elliptic curve cryptography on general curves",
    howpublished =  "{IACR} ePrint Archive, report 2008/194",
    month =         "March",
    year =          "2008",
    note =          "\url{http://eprint.iacr.org/2008/194}",
}

@Inproceedings{gentry,
    author =        "C.~Gentry",
    title =         "Certificate-Based Encryption and the Certificate Revocation Problem",
    booktitle =     "Advanced in Cryptology -- Eurocrypt'2003",
    series =        "Lecture Notes in Computer Science",
    volume =        "2656",
    publisher =     "Springer",
    year =          "2003",
    pages =         "272--293",
}

@Inproceedings{girault,
    author =        "M.~Girault",
    title =         "Self-certified public keys",
    booktitle =     "Advanced in Cryptology -- Eurocrypt'1991",
    series =        "Lecture Notes in Computer Science",
    volume =        "547",
    publisher =     "Springer",
    year =          "1991",
    pages =         "490--497",
}

@article{hess-smart-vercauteren,
    author =        "F.~Hess and N.~P.~Smart and F.~Vercauteren",
    title =         "The Eta Pairing Revisited",
    journal =       "{IEEE} Transactions on Information Theory",
    volume =        "52",
    number =        "10",
    year =          "2006",
    pages =         "4595--4602",
}

@article{li-xin-hu,
    author =        "F.~Li and X.~Xin and Y.~Hu",
    title =         "A pairing-based signcryption scheme using self-certified public keys",
    journal =       "International Journal of Computers and Applications",
    volume =        "29",
    number =        "3",
    year =          "2007",
    pages =         "278--282",
}


@phdthesis{libert,
    author =        "B.~Libert",
    title =         "New Secure Applications of Bilinear Maps in Cryptography",
    school =        "Universit\'{e} Catholique de Louvain",
    address =       "Louvain-La-Neuve, Belgium",
    year =          "2006",
    pages =         "268",
}

@Inproceedings{libert-quisquater,
    author =        "B.~Libert and J.~J.~Quisquater",
    title =         "On constructing certificateless cryptosystems from identity based encryption",
    booktitle =     "Public Key Cryptography Workshop -- {PKC}'2006",
    series =        "Lecture Notes in Computer Science",
    volume =        "3958",
    publisher =     "Springer",
    year =          "2006",
    pages =         "474--490",
}

@misc{mccullagh-barreto,
    author =        "N.~McCullagh and P.~S.~L.~M.~Barreto",
    title =         "Efficient and Forward-Secure Identity-Based Signcryption",
    howpublished =  "{IACR} ePrint Archive, report 2004/117",
    month =         "May",
    year =          "2004",
    note =          "\url{http://eprint.iacr.org/2004/117}",
}

@article{miyaji-nakabayashi-takano,
    author =        "A.~Miyaji and M.~Nakabayashi and S.~Takano",
    title =         "New Explicit Conditions of Elliptic Curve Traces for {FR}-Reduction",
    journal =       "{IEICE} Transactions on Fundamentals",
    volume =        "E84-A",
    number =        "5",
    year =          "2001",
    pages =         "1234--1243",
}

@manual{nist-fips-186-2,
    author =    "{NIST}",
    title =     "Federal Information Processing Standard ({FIPS 186-2}) -- Digital Signature Standard ({DSS})",
    organization =    "National Institute of Standards and Technology -- {NIST}",
    month =     "January",
    year =      "2000",
}

@misc{ortiz,
    author =        "C.E.~Ortiz",
    title =         "The Wireless Messaging API",
    howpublished =  "Sun Developer Network ({SDN}) article",
    month =         "December",
    year =          "2002",
    note =          "\url{http://developers.sun.com/mobility/midp/articles/wma/index.html}",
}

@misc{sylvers,
    author =        "E.~Sylvers",
    title =         "Start-ups aiming for cheaper text messaging",
    howpublished =  "Herald Tribune",
    month =         "October",
    year =          "2007",
    note =          "\url{http://www.iht.com/articles/2007/10/07/business/phones08.php}",
}

@Inproceedings{pointcheval-stern,
    author =        "D.~Pointcheval and J.~Stern",
    title =         "Security Proofs for Signature Schemes",
    booktitle =     "Advanced in Cryptology -- Eurocrypt'1996",
    series =        "Lecture Notes in Computer Science",
    volume =        "1070",
    publisher =     "Springer",
    year =          "1996",
    pages =         "387--398",
}

@Inproceedings{sakai-kasahara,
    author =        "R.~Sakai and M.~Kasahara",
    title =         "{ID} based Cryptosystems with Pairing on Elliptic Curve",
    booktitle =     "{SCIS}'2003",
    address =       "Hamamatsu, Japan",
    year =          "2003",
}

@Inproceedings{sakai-ohgishi-kasahara,
    author =        "R.~Sakai and K.~Ohgishi and M.~Kasahara",
    title =         "Cryptosystems based on pairing",
    booktitle =     "Symposium on Cryptography and Information Security -- {SCIS}'2000",
    address =       "Okinawa, Japan",
    year =          "2000",
}

@article{schnorr,
    author =        "C.~P.~Schnorr",
    title =         "Efficient Signature Generation by Smart Cards",
    journal =       "Journal of Cryptology",
    volume =        "4",
    number =        "3",
    year =          "1991",
    pages =         "161--174",
}

@Inproceedings{schnorr-jakobsson,
    author =        "C.~P.~Schnorr and M.~Jakobsson",
    title =         "Security Of Discrete Log Cryptosystems in the Random Oracle + Generic Model",
    booktitle =     "Conference on the Mathematics of Public-Key Cryptography",
    series =        "Proceedings",
    year =          "1999",
    publisher =     "The Fields Institute",
}

@misc{schnorr-patent,
    author =        "C.~P.~Schnorr",
    title =         "Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system",
    howpublished =  "US Patent \#4995082",
    month =         "February",
    year =          "1991",
    note =          "\url{http://patft.uspto.gov/netacgi/nph-Parser?patentnumber=4995082}. Expired in February 2008.",
}

@InProceedings{shamir,
    author =        "A.~Shamir",
    title =         "Identity Based Cryptosystems and Signature Schemes",
    booktitle =     "Advances in Cryptology -- Crypto'84",
    series =        "Lecture Notes in Computer Science",
    volume =        "0196",
    publisher =     "Springer",
    year =          "1984",
    pages =         "47--53",
}

@misc{vercauteren,
    author =        "F.~Vercauteren",
    title =         "Optimal Pairings",
    howpublished =  "{IACR} ePrint Archive, report 2008/096",
    month =         "March",
    year =          "2008",
    note =          "\url{http://eprint.iacr.org/2008/096}",
}

@InProceedings{zhang-safavi-naini-susilo,
    author =        "F.~Zhang and R.~Safavi-Naini and W.~Susilo",
    title =         "An efficient signature scheme from bilinear pairings and its applications",
    booktitle =     "Public Key Cryptography -- {PKC}'2004",
    series =        "Lecture Notes in Computer Science",
    volume =        "2947",
    publisher =     "Springer",
    year =          "2004",
    pages =         "277--290",
}

@InProceedings{zheng,
    author =        "Y.~Zheng",
    title =         "Digital Signcryption or How to Achieve Cost(Signature \& Encryption) << Cost(Signature) + Cost(Encryption)",
    booktitle =     "Advanced in Cryptology -- Crypto'97",
    series =        "Lecture Notes in Computer Science",
    volume =        "1294",
    publisher =     "Springer",
    year =          "1997",
    pages =         "165--179",
}

@techreport{zobrist,
    author =        "A.~L.~Zobrist",
    title =         "A Hashing Method with Applications for Game Playing",
    number =        "88",
    institution =   "Computer Sciences Department, University of Wisconsin",
    address =       "Madison, Wisconsin, {USA}",
    year =          "1969",
}

@misc{menezes,
    author =        "A.~Menezes and P.~Van ~Oorschot and S.~Vanstone",
    title =         "Handbook of Applied Cryptography",
    howpublished =  "CRC Press",
    year =          "1996",
}

@article{diffie-hellman,
    author =        "W.~Diffie and M.~Hellman",
    title =         "New directions in cryptography",
    journal =       "{IEEE} Transactions on Information Theory",
    volume =        "IT-31",
    number =        "22",
    year =          "1976",
    pages =         "644--654",
}

@article{merkle,
    author =        "R.~Merkle",
    title =         "Secure communications over insecure channels",
    journal =       "Communications of the {ACM}",
    number =        "21",
    year =          "1978",
    pages =         "294--299",
}

@article{rsa,
    author =        "R.~Rivest and A.~Shamir and L.~Adleman",
    title =         "A method for obtaining digital signatures and public-key cryptosystems",
    journal =       "Communications of the {ACM}",
    number =        "21",
    year =          "1978",
    pages =         "120--126",
}

@manual{osi,
    author =    "{ISO}",
    title =     "ISO/IEC 7498-1: Information technology - Open Systems Interconnection - Basic Reference Model: The Basic Model",
    organization =    "International Standards Organization {ISO}",
    year =      "1994",
}

@article{lenstra,
    author =        "H.~Lenstra",
    title =         "Factoring Integers with Elliptic Curves",
    journal =       "Ann. Math.",
    number =        "126",
    year =          "1987",
    pages =         "649-673",
}