-
1
-
-
35048896142
-
-
http://www.i2r.a-star.edu.sg/icsd/staff/guilin/bible/proxy.htm.
-
-
-
-
2
-
-
84937579774
-
DHIES: An encryption scheme based on the Diffie-Hellman problem
-
Lecture Notes in Computer Science, Springer-Verlag
-
M. Abdalla, M. Bellare and P. Rogaway. DHIES : An encryption scheme based on the Diffie-Hellman problem, Proceedings of CT-RSA 2001, Lecture Notes in Computer Science, Springer-Verlag, pages 143-158.
-
Proceedings of CT-RSA 2001
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
3
-
-
35048844366
-
ANSI X9.63 Public Key Cryptography for the Financial Services Industry: Elliptic Curve Key Agreement and Transport Schemes
-
American National Standards Institute (ANSI) X9.F1 sub-committee. ANSI X9.63 Public Key Cryptography for the Financial Services Industry: Elliptic Curve Key Agreement and Transport Schemes, 1998. Working draft version 2.0.
-
(1998)
Working Draft Version 2.0
-
-
-
4
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Lecture Notes in Computer Science, Springer-Verlag
-
D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. Proceedings of CRYPTO 2001, Lecture Notes in Computer Science, volume 2139, Springer-Verlag, pages 213-229.
-
Proceedings of CRYPTO 2001
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
35048901123
-
Public Key Encryption with Keyword Search
-
Lecture Notes in Computer Science, Springer-Verlag
-
D. Boneh, G. Di. Crescenzo, R. Ostrovsky and G. Persiano. Public Key Encryption with Keyword Search. Proceedings of EUROCRYPT 2004, Lecture Notes in Computer Science, Springer-Verlag, pp 506-522.
-
Proceedings of EUROCRYPT 2004
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.Di.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Lecture Notes in Computer Science, Springer-Verlag
-
P. S. L. M. Barreto, H. Y. Kim and M. Scott. Efficient algorithms for pairing-based cryptosystems. Proceedings of Crypto 2002, Lecture Notes in Computer Science, volume 2442, Springer-Verlag, pages 354-368.
-
Proceedings of Crypto 2002
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Scott, M.3
-
7
-
-
82955246861
-
Implementing the Tate Pairing
-
Lecture Notes in Computer Science, Springer-Verlag
-
S. Galbraith, K. Harrison and D. Soldera. Implementing the Tate Pairing. Proceedings of Algorithm Number Theory Symposium - ANTS V, 2002, Lecture Notes in Computer Science, volume 2369, Springer-Verlag, pages 324-337.
-
Proceedings of Algorithm Number Theory Symposium - ANTS V, 2002
, vol.2369
, pp. 324-337
-
-
Galbraith, S.1
Harrison, K.2
Soldera, D.3
-
8
-
-
35248863065
-
A tweakable enciphering mode
-
Lecture Notes in Computer Science, Springer-Verlag
-
S. Halevi and P. Rogaway. A tweakable enciphering mode. Proceedings of Crypto 2003, Lecture Notes in Computer Science, volume 2729, Springer-Verlag, pages 482-499.
-
Proceedings of Crypto 2003
, vol.2729
, pp. 482-499
-
-
Halevi, S.1
Rogaway, P.2
-
9
-
-
35048894821
-
A parallelizable enciphering mode
-
Lecture Notes in Computer Science, Springer-Verlag
-
S. Halevi and P. Rogaway. A parallelizable enciphering mode. Proceedings of CT-RSA 8004, Lecture Notes in Computer Science, Springer-Verlag, pages 292-304.
-
Proceedings of CT-RSA 8004
, pp. 292-304
-
-
Halevi, S.1
Rogaway, P.2
-
10
-
-
26444437239
-
How to remove MAC from DHIES
-
Lecture Notes in Computer Science, Springer-Verlag
-
K. Kurosawa and T. Matsuo. How to remove MAC from DHIES. Proceedings of ACISP, 2004, Lecture Notes in Computer Science, Springer-Verlag, pp 236-247.
-
Proceedings of ACISP, 2004
, pp. 236-247
-
-
Kurosawa, K.1
Matsuo, T.2
-
12
-
-
84860368738
-
Delegated Decryption
-
Lecture Notes in Computer Science, Springer-Verlag
-
Y. Mu, V. Varadharajan and K.Q. Nguyen. Delegated Decryption. Proceeding of IMA Conference on Coding and Cryptography, 1999, Lecture Notes in Computer Science, Springer-Verlag, volume 1746, 258-269, 1999.
-
(1999)
Proceeding of IMA Conference on Coding and Cryptography, 1999
, vol.1746
, pp. 258-269
-
-
Mu, Y.1
Varadharajan, V.2
Nguyen, K.Q.3
-
13
-
-
35048854587
-
An Efficient Signature Scheme from Bilinear Pairings and Its Applications
-
Lecture Notes in Computer Science, Springer-Verlag
-
F. Zhang, R. Safavi-Naini and W. Susilo. An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Proceedings of Public Key Cryptography 2004, Lecture Notes in Computer Science, volume 2947 , pp. 277-290. Springer-Verlag, 2004.
-
(2004)
Proceedings of Public Key Cryptography 2004
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
|