-
1
-
-
0345490607
-
Certificateless public key cryptography
-
Asiacrypt 2003
-
S. S. Al-Riyami and K. G. Peterson, "Certificateless public key cryptography," Asiacrypt 2003, LNCS Vol. 2894, pp. 452-474, 2003.
-
(2003)
LNCS
, vol.2894
, pp. 452-474
-
-
Al-Riyami, S.S.1
Peterson, K.G.2
-
2
-
-
24944468450
-
A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation
-
IEEE
-
M. Bellare, A. Desai, D. Jokipii, and P. Rogaway, "A concrete security treatment of symmetric encryption: analysis of the DES modes of operation," FOCS 1997, IEEE, 1997.
-
(1997)
FOCS 1997
-
-
Bellare, M.1
Desai, A.2
Jokipii, D.3
Rogaway, P.4
-
3
-
-
84874324906
-
Identity based encryption from the Weil pairing
-
Crypto 2001
-
D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," Crypto 2001, LNCS Vol. 2139, pp. 213-229, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
PKC 2003
-
J. C. Cha and J. H. Cheon, "An identity-based signature from gap Diffie-Hellman groups," PKC 2003, LNCS Vol. 2567, pp. 18-30, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
7
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
Eurocrypt 1988
-
L. C. Guillou and J. J. Quisquater, "A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory," Eurocrypt 1988, LNCS Vol. 330, pp. 123-128, 1988.
-
(1988)
LNCS
, vol.330
, pp. 123-128
-
-
Guillou, L.C.1
Quisquater, J.J.2
-
8
-
-
84947558992
-
A "paradoxical" identity-based signature scheme resulting from zero-knowledge
-
Crypto 1988
-
L. C. Guillou and J. J. Quisquater "A "paradoxical" identity-based signature scheme resulting from zero-knowledge," Crypto 1988, LNCS Vol. 403, pp. 216-231, 1988.
-
(1988)
LNCS
, vol.403
, pp. 216-231
-
-
Guillou, L.C.1
Quisquater, J.J.2
-
9
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Eurocrypt 2003
-
C. Gentry, "Certificate-based encryption and the certificate revocation problem," Eurocrypt 2003, LNCS Vol. 2656, pp. 272-293, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 272-293
-
-
Gentry, C.1
-
10
-
-
84937570422
-
Self-certified public keys
-
Eurocrypt 1991
-
M. Girault, "Self-certified public keys," Eurocrypt 1991, LNCS Vol. 547, pp. 490-497, 1992.
-
(1992)
LNCS
, vol.547
, pp. 490-497
-
-
Girault, M.1
-
11
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasswer, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," SIAM J. Computing, Vol 7, No 2, pp. 281-308, 1988.
-
(1988)
SIAM J. Computing
, vol.7
, Issue.2
, pp. 281-308
-
-
Goldwasswer, S.1
Micali, S.2
Rivest, R.3
-
12
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
SAC 2002
-
F. Hess, "Efficient identity based signature schemes based on pairings," SAC 2002, LNCS Vol. 2595, pp. 310-324, 2003.
-
(2003)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
13
-
-
33645598062
-
A certificate-based signature scheme
-
CT-RSA 2004
-
G. Kang, J. H. Park, and S. G. Hahn "A certificate-based signature scheme," CT-RSA 2004, LNCS Vol. 2964, pp. 99-111, 2004.
-
(2004)
LNCS
, vol.2964
, pp. 99-111
-
-
Kang, G.1
Park, J.H.2
Hahn, S.G.3
-
14
-
-
0037194815
-
ID-based signatures from pairings on elliptic curves
-
K. G. Paterson, "ID-based signatures from pairings on elliptic curves," Electronics Letters Vol. 38 (18), pp. 1025-1026, 2002.
-
(2002)
Electronics Letters
, vol.38
, Issue.18
, pp. 1025-1026
-
-
Paterson, K.G.1
-
15
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Crypto 1984
-
A. Shamir, "Identity-based cryptosystems and signature schemes," Crypto 1984, LNCS Vol. 196, pp. 47-53, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
16
-
-
84943283907
-
Generic construction of certificateless encryption
-
Assisi (Perugia, Italy), May 14 - May 17
-
D. H. Yum and P. J. Lee, "Generic construction of certificateless encryption," The 2004 International Conference on Computational Science and its Applications, Assisi (Perugia, Italy), May 14 - May 17, 2004.
-
(2004)
The 2004 International Conference on Computational Science and Its Applications
-
-
Yum, D.H.1
Lee, P.J.2
|