메뉴 건너뛰기




Volumn 3650 LNCS, Issue , 2005, Pages 203-217

Hybrid signcryption schemes with outsider security

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 33645962801     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11556992_15     Document Type: Conference Paper
Times cited : (69)

References (17)
  • 3
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • L. Knudsen, editor, Advances in Cryptology - Eurocrypt 2002. Springer-Verlag
    • J. H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In L. Knudsen, editor, Advances in Cryptology - Eurocrypt 2002, volume 2332 of Lecture Notes in Computer Science, pages 83-107. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 5
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • T. Okamoto, editor, Advances in Cryptology - Asiacrypt 2000. Springer-Verlag
    • M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In T. Okamoto, editor, Advances in Cryptology - Asiacrypt 2000, volume 1976 of Lecture Notes in Computer Science, pages 531-545. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 6
    • 35048826242 scopus 로고    scopus 로고
    • The EAX mode of operation
    • R. Bimal and W. Meier, editors, Proceedings of the 11th Workshop on Fast Software Encryption (FSE 2004). Springer-Verlag
    • M. Bellare, P. Rogaway, and D. Wagner. The EAX mode of operation. In R. Bimal and W. Meier, editors, Proceedings of the 11th Workshop on Fast Software Encryption (FSE 2004), volume 3017 of Lecture Notes in Computer Science, pages 391-408. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3017 , pp. 391-408
    • Bellare, M.1    Rogaway, P.2    Wagner, D.3
  • 8
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1):167-226, 2004.
    • (2004) SIAM Journal on Computing , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 14
    • 33646001565 scopus 로고    scopus 로고
    • Signcryption with non-interactive non-repudiation
    • Department of Computer Science, University of Bristol, May
    • J. Malone-Lee. Signcryption with non-interactive non-repudiation. Technical Report CSTR.-02-004, Department of Computer Science, University of Bristol, May 2004.
    • (2004) Technical Report , vol.CSTR.-02-004
    • Malone-Lee, J.1
  • 16
    • 84948976239 scopus 로고    scopus 로고
    • Using hash functions as a hedge against chosen ciphertext attack
    • B. Preneel, editor, Advances in Cryptology - Eurocrypt 2000. Springer-Verlag
    • V. Shoup. Using hash functions as a hedge against chosen ciphertext attack. In B. Preneel, editor, Advances in Cryptology - Eurocrypt 2000, volume 1807 of Lecture Notes in Computer Science, pages 275-288. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 275-288
    • Shoup, V.1
  • 17
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost(signature & encryption) ≤ cost(signature) + cost(encryption)
    • B. Kaliski, editor, Advances in Cryptology - Crypto '97. Springer-Verlag
    • Y. Zheng. Digital signcryption or how to achieve cost(signature & encryption) ≤ cost(signature) + cost(encryption). In B. Kaliski, editor, Advances in Cryptology - Crypto '97, volume 1294 of Lecture Notes in Computer Science, pages 165-179. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 165-179
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.