-
1
-
-
84937579774
-
The Oracle Diffie-Hellman assumptions and an analysis of DHIES
-
Springer-Verlag
-
M. Abdalla, M. Bellare and P. Rogaway, The Oracle Diffie-Hellman assumptions and an analysis of DHIES. In Topics in Cryptology - CT-RSA 2001, Lecture Notes in Computer Science, Vol. 2020, Springer-Verlag (2001) pp. 143-158.
-
(2001)
Topics in Cryptology - CT-RSA 2001, Lecture Notes in Computer Science
, vol.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
2
-
-
84947237328
-
On the security of joint signature and encryption
-
Springer-Verlag
-
J. H. An, Y. Dodis and T. Rabin, On the Security of Joint Signature and Encryption. In Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science, Vol. 2332, Springer-Verlag (2002) pp. 83-107.
-
(2002)
Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
3
-
-
84958982846
-
Formal proofs for the security of signcryption
-
Springer-Verlag
-
J. Baek, R. Steinfeld and Y. Zheng, Formal proofs for the security of signcryption. In Public Key Cryptography - PKC 2002, Lecture Notes in Computer Science, Vol. 2274, Springer-Verlag (2002) pp. 80-98.
-
(2002)
Public Key Cryptography - PKC 2002, Lecture Notes in Computer Science
, vol.2274
, pp. 80-98
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
5
-
-
84937428623
-
Efficient algorithms for paring-based cryptosystems
-
Springer-Verlag
-
P. S. L. M. Barreto, H. Y. Kim, B. Lynn and M. Scott, Efficient algorithms for paring-based cryptosystems. In Advances in Cryptology - CRYPTO 2002, Lecture Notes in Computer Science, Springer-Verlag (2002) pp. 354-368.
-
(2002)
Advances in Cryptology - CRYPTO 2002, Lecture Notes in Computer Science
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
6
-
-
84948957152
-
Public-key encryption in a multi-user setting: Security proofs and improvements
-
Springer-Verlag
-
M. Bellare, A. Boldyreva and S. Micali, Public-key encryption in a multi-user setting: Security proofs and improvements. In Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science, Vol. 1807, Springer-Verlag (2000) pp. 259-274.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science
, vol.1807
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
8
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, Relations among notions of security for public-key encryption schemes. In Advances in Cryptology - CRYPTO '98, Lecture Notes in Computer Science, Vol. 1462, Springer-Verlag (1998) pp. 26-45.
-
(1998)
Advances in Cryptology - CRYPTO '98, Lecture Notes in Computer Science
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
9
-
-
84957380575
-
Round-optimal zero-knowledge arguments based on any one-way function
-
Springer-Verlag
-
M. Bellare, M. Jakobsson and M. Yung, Round-optimal zero-knowledge arguments based on any one-way function. In Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science, Vol. 1233, Springer-Verlag (1997) pp. 280-305.
-
(1997)
Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science
, vol.1233
, pp. 280-305
-
-
Bellare, M.1
Jakobsson, M.2
Yung, M.3
-
16
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Springer-Verlag
-
R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Advances in Cryptology - CRYPTO '98, Lecture Notes in Computer Science, Vol. 1462, Springer-Verlag (1998) pp. 13-25.
-
(1998)
Advances in Cryptology - CRYPTO '98, Lecture Notes in Computer Science
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
17
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup, Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. In SIAM J. Comput.,Vol. 33, Issue 1 (2003) pp. 167-226.
-
(2003)
SIAM J. Comput.
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
19
-
-
0037105918
-
Public key signatures in the multi-user setting
-
S. Galbraith, J. Malone-Lee and N. P. Smart, Public key signatures in the multi-user setting. Inform. Process. Lett. Vol. 83, Issue 5 (2002) pp. 263-266.
-
(2002)
Inform. Process. Lett.
, vol.83
, Issue.5
, pp. 263-266
-
-
Galbraith, S.1
Malone-Lee, J.2
Smart, N.P.3
-
21
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali and R. Rivest, A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput., Vol. 17, Issue 2 (1998) pp. 281-308.
-
(1998)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
22
-
-
0032655531
-
Cryptanalysis and improvement of Petersen-Michels signcryption scheme
-
W. H. He and T. C. Wu, Cryptanalysis and improvement of Petersen-Michels signcryption scheme. IEE Proc. - Computers Digital Techniques, Vol. 146, Issue 2 (1999) pp. 123-124.
-
(1999)
IEE Proc. - Computers Digital Techniques
, vol.146
, Issue.2
, pp. 123-124
-
-
He, W.H.1
Wu, T.C.2
-
25
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. J. Menezes, T. Okamato and S. A. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inform. Theory, Vol. 39, Issue 5 (1993) pp. 1639-1646.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.J.1
Okamato, T.2
Vanstone, S.A.3
-
27
-
-
0037194815
-
ID-based signatures from pairings on elliptic curves
-
K. G. Patterson, ID-based signatures from pairings on elliptic curves. Electron Lett. Vol. 38, Issue 18 (2002) pp. 1025-1026.
-
(2002)
Electron Lett.
, vol.38
, Issue.18
, pp. 1025-1026
-
-
Patterson, K.G.1
-
28
-
-
0032027223
-
Cryptanalysis and improvement of signcryption schemes
-
H. Petersen and M. Michels, Cryptanalysis and improvement of signcryption schemes. IEE Proc. -Computers Digital Techniques, Vol. 145, Issue 2 (1998) pp. 149-151.
-
(1998)
IEE Proc. -computers Digital Techniques
, vol.145
, Issue.2
, pp. 149-151
-
-
Petersen, H.1
Michels, M.2
-
30
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. P. Schnorr, Efficient signature generation by smart cards, J. Cryptol, Vol. 4, Issue 3 (1991) pp. 161-174.
-
(1991)
J. Cryptol
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
31
-
-
0037142442
-
An identity based authenticated key agreement protocol based on the Weil pairing
-
N. P. Smart, An identity based authenticated key agreement protocol based on the Weil pairing. Electronic Lett., Vol. 38, Issue 13 (2002) pp. 630-632.
-
(2002)
Electronic Lett.
, vol.38
, Issue.13
, pp. 630-632
-
-
Smart, N.P.1
-
32
-
-
84945129491
-
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
-
Springer-Verlag
-
E. R. Verheul, Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. In Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Computer Science, Vol. 2045, Springer-Verlag (2001) pp. 195-210.
-
(2001)
Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Computer Science
, vol.2045
, pp. 195-210
-
-
Verheul, E.R.1
|