-
1
-
-
1842566513
-
DHAES: An encryption scheme based on the Diffie-Hellman problem
-
Report 1999/007
-
M. Abdalla, M. Bellare and P. Rogaway. DHAES: An encryption scheme based on the Diffie-Hellman problem. Cryptology ePrint Archive, Report 1999/007. 1999.
-
(1999)
Cryptology ePrint Archive
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
3
-
-
84948957152
-
Public-key encryption in the multi-user setting: Security proofs and improvements
-
LNCS 1807: Springer-Verlag
-
M. Bellare, A. Boldyreva and S. Micali. Public-key encryption in the multi-user setting: security proofs and improvements. Advances in Cryptology - EUROCRYPT 2000, LNCS 1807:259-274. Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
5
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
D. Boneh and M. Franklin. Identity based encryption from the Weil pairing. SIAM Journal on Computing, 32:586-615. 2003.
-
(2003)
SIAM Journal on Computing
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen-ciphertext attack
-
R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen-ciphertext attack. SIAM Journal on Computing, 33:167-226. 2003.
-
(2003)
SIAM Journal on Computing
, vol.33
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
8
-
-
33646842805
-
A designer's guide to KEMs
-
LNCS 2898: Springer-Verlag
-
A. W. Dent. A designer's guide to KEMs. Coding and Cryptography, LNCS 2898:133-151. Springer-Verlag, 2003.
-
(2003)
Coding and Cryptography
, pp. 133-151
-
-
Dent, A.W.1
-
11
-
-
1142282396
-
Authenticated identity-based encryption
-
Report 2002/072
-
B. Lynn. Authenticated identity-based encryption. Cryptology ePrint Archive, Report 2002/072. 2002.
-
(2002)
Cryptology ePrint Archive
-
-
Lynn, B.1
-
13
-
-
84937389342
-
The gap-problems: A new class of problems for the security of cryptographic schemes
-
LNCS 1992: Springer-Verlag
-
T. Okamoto and D. Pointcheval. The gap-problems: A new class of problems for the security of cryptographic schemes. Public Key Cryptography - PKC 2001, LNCS 1992:104-118. Springer-Verlag, 2001.
-
(2001)
Public Key Cryptography - PKC 2001
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
14
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
LNCS 576: Springer-Verlag
-
C. Rackoff and D. R. Simon Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. Advances in Cryptology - CRYPTO 1991, LNCS 576:433-444. Springer-Verlag, 1991
-
(1991)
Advances in Cryptology - CRYPTO 1991
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
15
-
-
35248891001
-
Access control using pairing based cryptography
-
LNCS 2612: Springer-Verlag
-
N. P. Smart. Access control using pairing based cryptography. Topics in Cryptology - CT-RSA 2003, LNCS 2612:111-121. Springer-Verlag, 2003.
-
(2003)
Topics in Cryptology - CT-RSA 2003
, pp. 111-121
-
-
Smart, N.P.1
-
16
-
-
23944449681
-
Efficient key encapsulation to multiple parties
-
LNCS 3352: Springer-Verlag
-
N. P. Smart. Efficient key encapsulation to multiple parties. Security in Communication Networks, LNCS 3352:208-219. Springer-Verlag, 2005.
-
(2005)
Security in Communication Networks
, pp. 208-219
-
-
Smart, N.P.1
|