-
2
-
-
84937579774
-
The oracle Diffie-Hellman assumptions and an analysis of DHAES
-
M. Abdalla, M. Bellare, and P. Rogaway. The oracle Diffie-Hellman assumptions and an analysis of DHAES. In CT-RSA, pages 143-158, 2001.
-
(2001)
CT-RSA
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
3
-
-
4043050062
-
Key-privacy in public-key encryption
-
M. Bellare, A. Boldyrevay, A. Desaiz, and D. Pointchevalx. Key-privacy in public-key encryption. In Aisacrypt '01, Proceedings, 2001.
-
(2001)
Aisacrypt '01, Proceedings
-
-
Bellare, M.1
Boldyrevay, A.2
Desaiz, A.3
Pointchevalx, D.4
-
4
-
-
0842283854
-
Randomness re-use in multi-recipient encryption schemes
-
Public-Key Cryptography '03, Proceedings, of, Springer-Verlag
-
M. Bellare, A. Boldyreva, and J. staddon. Randomness re-use in multi-recipient encryption schemes. In Public-Key Cryptography '03, Proceedings, volume 2567 of Lecture Notes in Computer Science. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2567
-
-
Bellare, M.1
Boldyreva, A.2
staddon, J.3
-
6
-
-
84954406641
-
Secret handshakes from pairing-based key agreements
-
D. Balfanz, G. Durfee, N. Shankar, D.K. Smetters, J. Staddon, and H.C. Wong. Secret handshakes from pairing-based key agreements. In IEEE Symposium on Security and Privacy, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.K.4
Staddon, J.5
Wong, H.C.6
-
8
-
-
84929273746
-
Untraceable electronic cash
-
Proc. Crypto'88, of, Springer-Verlag
-
D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In Proc. Crypto'88, volume 403 of LNCS, pages 319-327. Springer-Verlag, 1988.
-
(1988)
LNCS
, vol.403
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
11
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Proc. Eurocrypt '01, pages 93-118, 2001.
-
(2001)
Proc. Eurocrypt '01
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
14844304181
-
Public key broadcast encryption for stateless receivers
-
Y. Dodis and N. Fazio. Public key broadcast encryption for stateless receivers. In Digital Rights Management Workshop, pages 61-80, 2002.
-
(2002)
Digital Rights Management Workshop
, pp. 61-80
-
-
Dodis, Y.1
Fazio, N.2
-
13
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
August
-
E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Advances in Cryptology-CRYPTO'99, pages 537-554, August 1999.
-
(1999)
Advances in Cryptology-CRYPTO'99
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
15
-
-
38049038226
-
Authenticated group key agreement protocols with the privacy property of affiliation-hiding
-
S. Jarecki, J. Kim, and G. Tsudik. Authenticated group key agreement protocols with the privacy property of affiliation-hiding. In RSA Conference - Cryptography Track, 2007.
-
(2007)
RSA Conference - Cryptography Track
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
16
-
-
38049007799
-
Beyond secret handshakes: Affiliation-hiding authenticated key exchange protocols with perfect forward privacy
-
manuscript
-
S. Jarecki, J. Kim, and G. Tsudik. Beyond secret handshakes: Affiliation-hiding authenticated key exchange protocols with perfect forward privacy, manuscript, 2007.
-
(2007)
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
19
-
-
32344450592
-
Brief announcement: A flexible framework for secret handshakes
-
New York, NY, USA, ACM Press
-
Gene Tsudik and Shouhuai Xu. Brief announcement: a flexible framework for secret handshakes. In PODC '05: Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing, pages 39-39, New York, NY, USA, 2005. ACM Press.
-
(2005)
PODC '05: Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
, pp. 39-39
-
-
Tsudik, G.1
Xu, S.2
-
20
-
-
38049022402
-
-
International Workshop on Coding and Cryptography, Bergen, Norway
-
D. Vergnaud. RSA-based secret handshakes. In In International Workshop on Coding and Cryptography, Bergen, Norway, 2005.
-
(2005)
RSA-based secret handshakes
-
-
Vergnaud, D.1
-
21
-
-
0002360030
-
Secure group communications using key graphs
-
C. Wong, M. Gouda, and S. Lam. Secure group communications using key graphs. In SIGCOMM '98, 1998.
-
(1998)
SIGCOMM '98
-
-
Wong, C.1
Gouda, M.2
Lam, S.3
-
23
-
-
14844289583
-
-
Shouhuai Xu and Moti Yung, k-anonymous secret handshakes with reusable credentials. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 158-167, New York, NY, USA, 2004. ACM Press.
-
Shouhuai Xu and Moti Yung, k-anonymous secret handshakes with reusable credentials. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 158-167, New York, NY, USA, 2004. ACM Press.
-
-
-
|