-
1
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, "A concrete security treatment of symmetric encryption." Proc. 38th IEEE Symposium on Foundations of Computer Science (FOCS), pp.394-403, 1997.
-
(1997)
Proc. 38th IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
2
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Advances in Cryptology-CRYPTO'98, Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, "Relations among notions of security for public-key encryption schemes," Advances in Cryptology-CRYPTO'98, LNCS 1462, pp.26-45, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
3
-
-
84947778144
-
The decision Diffie-Hellman problem
-
Proc. ANTS III, Springer-Verlag
-
D. Boneh, "The decision Diffie-Hellman problem," Proc. ANTS III, LNCS 1423, pp.48-63, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
-
4
-
-
84957085257
-
An efficient public key traitor tracing scheme
-
Advances in Cryptology-CRYPTO'99, Springer-Verlag
-
D. Boneh and M. Franklin, "An efficient public key traitor tracing scheme," Advances in Cryptology-CRYPTO'99, LNCS 1592, pp.338-353, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology-CRYPTO 2001, Springer-Verlag
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," Advances in Cryptology-CRYPTO 2001, LNCS 2139, pp.213-229, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
Full version of [5]
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing." SIAM J. Comput., vol.32, no.3, pp.586-615, 2003. Full version of [5].
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
84985922619
-
Tracing traitors
-
Advances in Cryptology-CRYPTO'94, Springer-Verlag
-
B. Chor, A. Fiat, and M. Naor, "Tracing traitors," Advances in Cryptology-CRYPTO'94, LNCS 839, pp.257-270, Springer-Verlag, 1994.
-
(1994)
LNCS
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
8
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Advances in Cryptology-CRYPTO'98, Springer-Verlag
-
R. Cramer and V. Shoup, "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack," Advances in Cryptology-CRYPTO'98, LNCS 1462, pp. 13-25, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
9
-
-
84958957924
-
RIPEMD160: Strengthened version of RIPEMD
-
Proc. FSE'96, Springer-Verlag
-
H. Dobbertin, A. Bosselaers, and B. Preneel, "RIPEMD160: Strengthened version of RIPEMD," Proc. FSE'96, LNCS 1039, pp.71-82, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1039
, pp. 71-82
-
-
Dobbertin, H.1
Bosselaers, A.2
Preneel, B.3
-
10
-
-
84947254092
-
Key-insulated public key cryptosystems
-
Advances in Cryptology-EUROCRYPT 2002, Springer-Verlag
-
Y. Dodis, J. Katz, S. Xu, and M. Yung, "Key-insulated public key cryptosystems." Advances in Cryptology-EUROCRYPT 2002, LNCS 2332, pp.65-82, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 65-82
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
11
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms." IEEE Trans. Inf. Theory. vol.IT-31, no.4, pp.469-472, 1985.
-
(1985)
IEEE Trans. Inf. Theory.
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
12
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Advances in Cryptology-ASIACRYPT 2002, Springer-Verlag
-
C. Gentry and A. Silverberg, "Hierarchical ID-based cryptography," Advances in Cryptology-ASIACRYPT 2002, LNCS 2501, pp.548-566, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
13
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
Advances in Cryptology-EUROCRYPT 2002, Springer-Verlag
-
J. Horwitz and B. Lynn, "Toward hierarchical identity-based encryption," Advances in Cryptology-EUROCRYPT 2002, LNCS 2332, pp.466-481, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
14
-
-
0842327109
-
Separating encryption and key issuance in digital rights management systems
-
Proc. ACISP'03, Springer-Verlag
-
G. Hanaoka, K. Ogawa, I. Murota, G. Ohtake, K. Majima, S. Gohshi, K. Oyamada, S. Namba, and H. Imai, "Separating encryption and key issuance in digital rights management systems," Proc. ACISP'03, LNCS 2727, pp.365-376, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2727
, pp. 365-376
-
-
Hanaoka, G.1
Ogawa, K.2
Murota, I.3
Ohtake, G.4
Majima, K.5
Gohshi, S.6
Oyamada, K.7
Namba, S.8
Imai, H.9
-
15
-
-
85027183613
-
-
http://www.intertrust.com/
-
-
-
-
16
-
-
35248866858
-
Optimum traitor tracing and asymmetric schemes
-
Advances in Cryptology-EUROCRYPT'98, Springer-Verlag
-
K. Kurosawa and Y. Desmedt, "Optimum traitor tracing and asymmetric schemes," Advances in Cryptology-EUROCRYPT'98, LNCS 1403, pp.145-157, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1403
, pp. 145-157
-
-
Kurosawa, K.1
Desmedt, Y.2
-
17
-
-
85027110814
-
-
http://www.microsoft.com/windows/windowsmedia/drm.asp
-
-
-
-
18
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Advances in Cryptology-CRYPTO'91, Springer-Verlag
-
C. Rackoff and D.R. Simon, "Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack." Advances in Cryptology-CRYPTO'91. LNCS 576, pp.433-444, Springer-Verlag, 1992.
-
(1992)
LNCS
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
19
-
-
0003629991
-
-
FIPS PUB 180-1, Department of Commerce, Washington D.C
-
NIST, "Secure hash standard," FIPS PUB 180-1, Department of Commerce, Washington D.C., 1995.
-
(1995)
Secure Hash Standard
-
-
-
20
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology-CKYPTO'84, Springer-Verlag
-
A. Shamir, "Identity-based cryptosystems and signature schemes," Advances in Cryptology-CKYPTO'84, LNCS 196, pp.47-53, Springer-Verlag, 1985.
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
21
-
-
85027106347
-
-
http://www.xrml.com/
-
-
-
-
22
-
-
84985796228
-
HAVAL - A one-way hashing algorithm with variable length of output
-
Proc. Auscrypt'92, Springer-Verlag
-
Y. Zheng, J. Pieprzyk, and J. Seberry, "HAVAL - A one-way hashing algorithm with variable length of output," Proc. Auscrypt'92, LNCS 718, pp.83-104, Springer-Verlag, 1993.
-
(1993)
LNCS
, vol.718
, pp. 83-104
-
-
Zheng, Y.1
Pieprzyk, J.2
Seberry, J.3
|