-
1
-
-
84947237328
-
On the Security of Joint Signature and Encryption
-
Lars R. Knudsen, editor, Springer-Verlag Heidelberg
-
Jee Hea An, Yevgeniy Dodis, and Tal Rabin. On the Security of Joint Signature and Encryption. In Lars R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, International Conference, on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, volume 2332 of Lecture Notes in Computer Science, pages 83-107. Springer-Verlag Heidelberg, 2002.
-
(2002)
Advances in Cryptology - EUROCRYPT 2002, International Conference, on the Theory and Applications of Cryptographic Techniques, Amsterdam, the Netherlands, April 28 - May 2, 2002, Proceedings, Volume 2332 of Lecture Notes in Computer Science
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
2
-
-
0142156713
-
Variations of Diffie-Hellman Problem
-
Dieter Qing, Dieter Gollmann, and Jianying Zhou, editors, Information and Communications Security, 5th International Conference, ICICS 2003, InnerMongolia 10-13 October, 2003, Proceedings, Springer
-
Feng Bao, Robert H. Deng, and Huafei Zhu. Variations of Diffie-Hellman Problem. In Dieter Qing, Dieter Gollmann, and Jianying Zhou, editors, Information and Communications Security, 5th International Conference, ICICS 2003, InnerMongolia 10-13 October, 2003, Proceedings, volume 2836 of Lecture Notes in Computer Science. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2836
-
-
Bao, F.1
Deng, R.H.2
Zhu, H.3
-
3
-
-
84937428623
-
Efficient Algorithms for Pairing-Based Cryptosystems
-
Moti Yung, editor, Advances in Cryptology: Proceedings of CRYPTO 2002 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002 Proceedings, Springer-Verlag Heidelberg
-
Paulo S.L.M. Barreto, Hae Yong Kim, Ben Lynn, and Michael Scott. Efficient Algorithms for Pairing-Based Cryptosystems. In Moti Yung, editor, Advances in Cryptology: Proceedings of CRYPTO 2002 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002 Proceedings, volume 2442 of Lecture Notes in Computer Science, pages 354-368. Springer-Verlag Heidelberg, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
5
-
-
35248891000
-
Forward-Security in Private-Key Cryptography
-
Marc Joye, editor, Topics in Cryptology - CT-RSA2003, The Cryptographer's Track at RSA Conference 2003
-
Mihir Bellare and Bennet Yee. Forward-Security in Private-Key Cryptography. In Marc Joye, editor, Topics in Cryptology - CT-RSA2003, The Cryptographer's Track at RSA Conference 2003, volume 2612 of Lecture Notes in Computer Science, pages 1-18, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2612
, pp. 1-18
-
-
Bellare, M.1
Yee, B.2
-
6
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 1923, 2001, Proceedings, Springer-Verlag Heidelberg
-
Dan Boneh and Matt Franklin. Identity-Based Encryption from the Weil Pairing. In Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 1923, 2001, Proceedings, volume 2139 of Lecture Notes in Computer Science, pages 213-229. Springer-Verlag Heidelberg, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
35248874429
-
Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptography
-
Dan Boneh, editor, 23rd International Conference on Advances in Cryptology - CRYPTO 2003, Springer Verlag
-
Xavier Boyen. Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography. In Dan Boneh, editor, 23rd International Conference on Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 382-398. Springer Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 382-398
-
-
Boyen, X.1
-
8
-
-
35248844436
-
An Identity-Based Signature from Gap Diffie-Hellman Groups
-
Yvo Desmedt, editor, Public Key Cryptography - PKC 2003, Sixth International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, Springer
-
Jae Choon Cha and Jung Hee Cheon. An Identity-Based Signature from Gap Diffie-Hellman Groups. In Yvo Desmedt, editor, Public Key Cryptography - PKC 2003, Sixth International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, volume 2567 of Lecture Notes in Computer Science. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2567
-
-
Cha, J.C.1
Cheon, J.H.2
-
9
-
-
84863277229
-
-
Cryptology ePrint Archive, Report 2003/262, 2003.
-
Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu and K.P. Chow. A Secure Modified ID-Based Undeniable Signature Scheme based on Han et al.'s Scheme against Zhang et al.'s Attacks. Cryptology ePrint Archive, Report 2003/262, 2003. Available at http://eprint.iacr.org.
-
A Secure Modified ID-Based Undeniable Signature Scheme Based on Han et Al.'s Scheme Against Zhang et Al.'s Attacks.
-
-
Chow, S.S.M.1
Hui, L.C.K.2
Yiu, S.M.3
Chow, K.P.4
-
10
-
-
82955246861
-
Implementing the Tate Pairing
-
Claus Fieker and David R. Kohel, editors, Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002, Proceedings, Springer
-
Steven D. Galbraith, Keith Harrison, and David Soldera. Implementing the Tate Pairing. In Claus Fieker and David R. Kohel, editors, Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002, Proceedings, volume 2369 of Lecture Notes in Computer Science, pages 324-337. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2369
, pp. 324-337
-
-
Galbraith, S.D.1
Harrison, K.2
Soldera, D.3
-
11
-
-
35048817852
-
Encrypted Message Authentication by Firewalls. in Hideki Imai and Yuliang Zheng, editors, Public Key Cryptography: Second International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999 Kamakura, Japan, March 1-3, 1999
-
Springer-Verlag, Heidelberg
-
Chandana Gamage, Jussipekka Leiwo, and Yuliang Zheng. Encrypted Message Authentication by Firewalls. In Hideki Imai and Yuliang Zheng, editors, Public Key Cryptography: Second International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999 Kamakura, Japan, March 1-3, 1999, volume 1560 of Lecture Notes in Computer Science, pages 69-81. Springer-Verlag, Heidelberg, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1560
, pp. 69-81
-
-
Gamage, C.1
Leiwo, J.2
Zheng, Y.3
-
12
-
-
35248867510
-
Efficient Identity Based Signature Schemes based on Pairings
-
K. Nyberg and H. Heys, editors, Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. Johns, Newfoundland, Canada, August 15-16, 2002. Revised Papers, Springer-Verlag Heidelberg, February
-
Florian Hess. Efficient Identity Based Signature Schemes based on Pairings. In K. Nyberg and H. Heys, editors, Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. Johns, Newfoundland, Canada, August 15-16, 2002. Revised Papers, volume 2595 of Lecture Notes in Computer Science, pages 310-324. Springer-Verlag Heidelberg, February 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
13
-
-
35248849357
-
Efficient Computations of the Tate Pairing for the Large MOV Degrees
-
Pil Joong Lee and Chae Hoon Lim, editors, Information Security and Cryptology - ICISC 2002, 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers, Springer-Verlag Heidelberg
-
Tetsuya Izu and Tsuyoshi Takagi. Efficient Computations of the Tate Pairing for the Large MOV Degrees. In Pil Joong Lee and Chae Hoon Lim, editors, Information Security and Cryptology - ICISC 2002, 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers, volume 2587 of Lecture Notes in Computer Science, pages 283-297. Springer-Verlag Heidelberg, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2587
, pp. 283-297
-
-
Izu, T.1
Takagi, T.2
-
14
-
-
33645379582
-
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption
-
Pil Joong Lee and Chae Hoon Lim, editors, Information Security and Cryptology ICISC 2002, 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers, Springer-Verlag Heidelberg
-
Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, and Jong In Lim. Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. In Pil Joong Lee and Chae Hoon Lim, editors, Information Security and Cryptology ICISC 2002, 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers, volume 2587 of Lecture Notes in Computer Science, pages 16-34. Springer-Verlag Heidelberg, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2587
, pp. 16-34
-
-
Jeong, I.R.1
Jeong, H.Y.2
Rhee, H.S.3
Lee, D.H.4
Lim, J.I.5
-
15
-
-
35048875647
-
Implementation of Tate Pairing of Hyperelliptic Curves of Genus 2
-
Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th Annual International Conference on Information Security and Cryptology, Seoul, Korea, Nov 2003, Proceedings, Springer-Verlag, to appear.
-
Eunjeong Lee and YoungJu Choie. Implementation of Tate Pairing of Hyperelliptic Curves of Genus 2. In Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th Annual International Conference on Information Security and Cryptology, Seoul, Korea, Nov 2003, Proceedings, Lecture Notes in Computer Science, Springer-Verlag, to appear.
-
Lecture Notes in Computer Science
-
-
Lee, E.1
Choie, Y.2
-
16
-
-
84939205648
-
New Identity Based Signcryption Schemes from Pairings
-
Benoît Libert and Jean-Jacques Quisquater. New Identity Based Signcryption Schemes from Pairings. In IEEE Information Theory Workshop, pages 155-158, 2003. Full version available at http://eprint.iacr.org.
-
(2003)
IEEE Information Theory Workshop
, pp. 155-158
-
-
Libert, B.1
Quisquater, J.-J.2
-
20
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
G.R. Blakley and David Chaum, editors, Advances in Cryptology, Proceedings of CRYPTO 1984, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, Springer-Verlag
-
Adi Shamir. Identity-Based Cryptosystems and Signature Schemes. In G.R. Blakley and David Chaum, editors, Advances in Cryptology, Proceedings of CRYPTO 1984, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer-Verlag, 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
21
-
-
35248891585
-
New DSA-Verifiable Signcryption Schemes
-
Pil Joong Lee and Chae Hoon Lim, editors, Information Security and Cryptology - ICISC 2002, 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers, Springer-Verlag Heidelberg
-
Jun-Bum Shin, Kwangsu Lee, and Kyungah Shim. New DSA-Verifiable Signcryption Schemes. In Pil Joong Lee and Chae Hoon Lim, editors, Information Security and Cryptology - ICISC 2002, 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers, volume 2587 of Lecture Notes in Computer Science, pages 35-47. Springer-Verlag Heidelberg, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2587
, pp. 35-47
-
-
Shin, J.-B.1
Lee, K.2
Shim, K.3
-
22
-
-
63449122349
-
Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪Cost(Signature) + Cost (Encryption)
-
Burton S. Kaliski Jr., editor, Advances in Cryptology: Proceedings of CRYPTO 1997 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Springer-Verlag
-
Yuliang Zheng. Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪Cost(Signature) + Cost (Encryption). In Burton S. Kaliski Jr., editor, Advances in Cryptology: Proceedings of CRYPTO 1997 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, volume 1294 of Lecture Notes in Computer Science, pages 165-179. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
|