The following publications are possibly variants of this publication:
- Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature SchemeBennian Dou, Hong Zhang, Chun-Hua Chen, Chungen Xu. ieicet, 96-A(1):242-243, 2013. [doi]
- Key Substitution Attacks on the CFS SignatureBennian Dou, Chun-Hua Chen, Hong Zhang. ieicet, 95-A(1):414-416, 2012. [doi]
- Key Substitution Attacks on Multisignature SchemesBennian Dou, Hong Zhang, Chun-Hua Chen, Chungen Xu. ieicet, 96-A(1):244-245, 2013. [doi]