-
1
-
-
63449122349
-
Digital Signcryption or How to Achieve Cost (Signature & Encryption) < < Cost (Signature) + Cost (Encryption)
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) < < Cost (Signature) + Cost (Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
2
-
-
38349027053
-
-
Zheng, Y.: Shortened Digital Signature, Signcryption and Compact and Unforgeable Key Agreement Schemes. Technical report, A submission to IEEE P1363 Standard Specifications for Public Key Cryptography (1998), http://grouper.ieee. org/groups/1363/StudyGroup/Hybrid.html
-
Zheng, Y.: Shortened Digital Signature, Signcryption and Compact and Unforgeable Key Agreement Schemes. Technical report, A submission to IEEE P1363 Standard Specifications for Public Key Cryptography (1998), http://grouper.ieee. org/groups/1363/StudyGroup/Hybrid.html
-
-
-
-
3
-
-
84947237328
-
On the Security of Joint Signature and Encryption
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
An, J., Dodis, Y., Rabin, T.: On the Security of Joint Signature and Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 83-107. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.1
Dodis, Y.2
Rabin, T.3
-
4
-
-
38349063258
-
-
An, J.: Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses. Cryptology ePrint Archive, Report, 2001/079 (2001), http://eprint.iacr.org/2001/079
-
An, J.: Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses. Cryptology ePrint Archive, Report, 2001/079 (2001), http://eprint.iacr.org/2001/079
-
-
-
-
6
-
-
33645962801
-
-
Dent, A.: Hybrid Signcryption Schemes with Outsider Security. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, 3650, pp. 203-217. Springer, Heidelberg (2005)
-
Dent, A.: Hybrid Signcryption Schemes with Outsider Security. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 203-217. Springer, Heidelberg (2005)
-
-
-
-
7
-
-
38349066145
-
-
Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. Technical report (2002), http://shoup.net/
-
Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. Technical report (2002), http://shoup.net/
-
-
-
-
8
-
-
33745861740
-
Hybrid Cryptography
-
Dent, A.: Hybrid Cryptography. Cryptology ePrint Archive, Report, 2004/210 (2004), http://eprint.iacr.org/2004/_rfaut Dent A.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.210
-
-
-
9
-
-
26444544161
-
-
Dent, A.: Hybrid Signcryption Schemes with Insider Security. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, 3574, pp. 253-266. Springer, Heidelberg (2005)
-
Dent, A.: Hybrid Signcryption Schemes with Insider Security. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 253-266. Springer, Heidelberg (2005)
-
-
-
-
10
-
-
33745179557
-
High-Performance Secure Diffie-Hellman Protocol
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Krawczyk, H., HMQV,: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
HMQV, A.2
-
11
-
-
84958982846
-
-
Baek, J., Steinfeld, R., Zheng, Y.: Formal Proofs for the Security of Signcryption. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, 2274, Springer, Heidelberg (2002)
-
Baek, J., Steinfeld, R., Zheng, Y.: Formal Proofs for the Security of Signcryption. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, Springer, Heidelberg (2002)
-
-
-
-
12
-
-
33947512019
-
Formal Proofs for the Security of Signcryption
-
Baek, J., Steinfeld, R., Zheng, Y.: Formal Proofs for the Security of Signcryption. Journal of Cryptology 20, 203-235 (2007)
-
(2007)
Journal of Cryptology
, vol.20
, pp. 203-235
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
13
-
-
33745859311
-
-
Bjørstad, T., Dent, A.: Building Better Signcryption Schemes with Tag-KEMs. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 491-507. Springer, Heidelberg (2006)
-
Bjørstad, T., Dent, A.: Building Better Signcryption Schemes with Tag-KEMs. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 491-507. Springer, Heidelberg (2006)
-
-
-
-
14
-
-
0031642585
-
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract)
-
Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract). In: STOC1998. Proc. of the 30th Annual ACM Symposium on Theory of Computing, pp. 419-428 (1998)
-
(1998)
STOC1998. Proc. of the 30th Annual ACM Symposium on Theory of Computing
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
15
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
16
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
17
-
-
35048850548
-
-
Tin, Y.S.T., Vasanta, H., Boyd, C., González-Nieto, J.M.: Protocols with Security Proofs for Mobile Applications. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, 3108, pp. 358-369. Springer, Heidelberg (2004)
-
Tin, Y.S.T., Vasanta, H., Boyd, C., González-Nieto, J.M.: Protocols with Security Proofs for Mobile Applications. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 358-369. Springer, Heidelberg (2004)
-
-
-
-
18
-
-
34047099328
-
On the Security of Tag-KEM for Signcryption. Electr
-
Yoshida, M., Fujiwara, T.: On the Security of Tag-KEM for Signcryption. Electr. Notes Theor. Comput. Sci. 171, 83-91 (2007)
-
(2007)
Notes Theor. Comput. Sci
, vol.171
, pp. 83-91
-
-
Yoshida, M.1
Fujiwara, T.2
-
19
-
-
38349003005
-
-
International Organization for Standardization: ISO/IEC CD 18033-2, Information technology - Security techniques - Encryption Algorithms - Part 2: Asymmetric Ciphers (2003)
-
International Organization for Standardization: ISO/IEC CD 18033-2, Information technology - Security techniques - Encryption Algorithms - Part 2: Asymmetric Ciphers (2003)
-
-
-
-
20
-
-
84937389342
-
-
Okamoto, T., Pointcheval, D.: The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, 1992, pp. 104-118. Springer, Heidelberg (2001)
-
Okamoto, T., Pointcheval, D.: The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104-118. Springer, Heidelberg (2001)
-
-
-
|