-
1
-
-
24944516264
-
Tag-KEM/DEM: A new framework for hybrid encryption
-
In: Cramer, R. (ed.) Lecture Notes in Computer Science Springer, Heidelberg
-
Abe, M., Gennaro, R., Karosawa, K., Shoup, V.: Tag-KEM/DEM: A new framework for hybrid encryption. In: Cramer, R. (ed.) Advance in Cryptology - Eurocrypt 2005. Lecture Notes in Computer Science, vol. 3494, pp. 128-146. Springer, Heidelberg (2005)
-
(2005)
Advance in Cryptology - Eurocrypt 2005
, vol.3494
, pp. 128-146
-
-
Abe, M.1
Gennaro, R.2
Karosawa, K.3
Shoup, V.4
-
3
-
-
0345490607
-
Certificateless public key cryptography
-
In: Laih, C.S. (ed.) Lecture Notes in Computer Science Springer, Heidelberg
-
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.S. (ed.) Advances in Cryptology-Asiacrypt 2003. Lecture Notes in Computer Science, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
-
(2003)
Advances in Cryptology-Asiacrypt 2003
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
4
-
-
24144438230
-
CBE from CL-PKE: A generic construction and efficient schemes
-
In: Vaudenay, S. (ed.) Lecture Notes in Computer Science Springer, Heiedelberg
-
Al-Riyami, S.S., Paterson, K.G.: CBE from CL-PKE: A generic construction and efficient schemes. In: Vaudenay, S. (ed.) Public Key Cryptography-PKC 2005. Lecture Notes in Computer Science, vol. 3386, pp. 398-415. Springer, Heiedelberg (2005)
-
(2005)
Public Key Cryptography-PKC 2005
, vol.3386
, pp. 398-415
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
5
-
-
84876300178
-
Malicious KGC attack in certificateless cryptography
-
In: ACM Press, New York
-
Au, M.H., Chen, J., Liu, J.K., Mu, Y., Wong, D.S., Yang, G.: Malicious KGC attack in certificateless cryptography. In: Proceedings pf ACM Symposium on Information, Computer and Communications Security. ACM Press, New York (2007)
-
(2007)
Proceedings Pf ACM Symposium on Information, Computer and Communications Security
-
-
Au, M.H.1
Chen, J.2
Liu, J.K.3
Mu, Y.4
Wong, D.S.5
Yang, G.6
-
7
-
-
33645958856
-
Certificateless public key encryption without pairing
-
In: Zhou, J., Lopez, J. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
-
Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., Lopez, J. (eds.) Proceedings of the 8th International Conference on Information Security (ISC 2005). Lecture Notes in Computer Science, vol. 3650, pp. 134-148. Springer, Heidelberg (2005)
-
(2005)
Proceedings of the 8th International Conference on Information Security (ISC 2005)
, vol.3650
, pp. 134-148
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
9
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
In: Vaudenay, S. (ed.) Lecture Notes in Computer Science Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) Advances in Cryptology-Eurocrypt 2006. Lecture Notes in Computer Science, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
-
(2006)
Advances in Cryptology-Eurocrypt 2006
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
10
-
-
33645751082
-
-
Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs (2005). http:// eprint.iacr.org/2005/058
-
(2005)
Generic Constructions of Identity-based and Certificateless KEMs
-
-
Bentahar, K.1
Farshim, P.2
Malone-Lee, J.3
Smart, N.P.4
-
11
-
-
38049077890
-
A closer look at PKI: Security and efficiency
-
In: Okamoto, T., Wang, X. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
-
Boldyreva, A., Fischlin, M., Palacio, A., Warinschi, B.: A closer look at PKI: Security and efficiency. In: Okamoto, T., Wang, X. (eds.) Public Key Cryptography-PKC 2007. Lecture Notes in Computer Science, vol. 4450, pp. 458-475. Springer, Heidelberg (2007)
-
(2007)
Public Key Cryptography-PKC 2007
, vol.4450
, pp. 458-475
-
-
Boldyreva, A.1
Fischlin, M.2
Palacio, A.3
Warinschi, B.4
-
12
-
-
24144453101
-
Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
-
In: Menezes, A., (ed.) Lecture Notes in Computer Science Springer, Heidelberg
-
Boneh, D., Katz, J.: Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Menezes, A., (ed.) Topics in Cryptology-CT-RSA 2005. Lecture Notes in Computer Science, vol. 3376, pp. 87-103. Springer, Heidelberg (2005)
-
(2005)
Topics in Cryptology-CT-RSA 2005
, vol.3376
, pp. 87-103
-
-
Boneh, D.1
Katz, J.2
-
13
-
-
33745767987
-
Direct chosen ciphertext security from identity-based techniques
-
In:
-
Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identity-based techniques. In: Proceeding of the 12th ACM Conference on Computer and Communications Security, pp. 320-329 (2005)
-
(2005)
Proceeding of the 12th ACM Conference on Computer and Communications Security
, pp. 320-329
-
-
Boyen, X.1
Mei, Q.2
Waters, B.3
-
15
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
Cramer R., Shoup V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J Comput 33 (1), 167-226 (2004)
-
(2004)
SIAM J Comput
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
16
-
-
40249097044
-
Certificateless encryption schemes strongly secure in the standard model
-
(Unpublished Manuscript)
-
Dent, A.W., Libert, B., Paterson, K.G.: Certificateless encryption schemes strongly secure in the standard model (2007, Unpublished Manuscript)
-
(2007)
-
-
Dent, A.W.1
Libert, B.2
Paterson, K.G.3
-
18
-
-
24144468589
-
Chosen-ciphertext security of multiple encryption
-
In: Kilian, J. (ed.) Lecture Notes in Computer Science Springer, Heidelberg
-
Dodis, Y., Katz, J.: Chosen-ciphertext security of multiple encryption. In: Kilian, J. (ed.) Theory of Cryptography-TCC 2005. Lecture Notes in Computer Science, vol. 3378, pp. 188-209. Springer, Heidelberg (2005)
-
(2005)
Theory of Cryptography-TCC 2005
, vol.3378
, pp. 188-209
-
-
Dodis, Y.1
Katz, J.2
-
19
-
-
84956859011
-
How to enhance the security of public-key encryption at minimal cost
-
In: Imai, H., Zheng, Y. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: How to enhance the security of public-key encryption at minimal cost. In: Imai, H., Zheng, Y. (eds.) Public Key Cryptography, Lecture Notes in Computer Science, vol. 1560, pp. 53-68. Springer, Heidelberg (1999)
-
(1999)
Public Key Cryptography
, vol.1560
, pp. 53-68
-
-
Fujisaki, E.1
Okamoto, T.2
-
20
-
-
33746215222
-
Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes
-
In: Atzeni, A.S., Lioy, A. (eds.) 2006) Lecture Notes in Computer Science Springer, Heidelberg
-
Galindo, D., Morillo, P., Ráfols, C.: Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes. In: Atzeni, A.S., Lioy, A. (eds.) Public Key Infrastructure: 3rd European PKI Workshop (EuroPKI 2006). Lecture Notes in Computer Science, vol. 4043, pp. 81-91. Springer, Heidelberg (2006)
-
(2006)
Public Key Infrastructure: 3rd European PKI Workshop (EuroPKI
, vol.4043
, pp. 81-91
-
-
Galindo, D.1
Morillo, P.2
Ráfols, C.3
-
21
-
-
38149074788
-
Generic certificateless encryption in the standard model
-
In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
-
Huang, Q., Wong, D.S.: Generic certificateless encryption in the standard model. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) Advances in Information and Computer Security (IWSEC 2007). Lecture Notes in Computer Science, vol. 4752, pp. 278-291. Springer, Heidelberg (2007)
-
(2007)
Advances in Information and Computer Security (IWSEC 2007)
, vol.4752
, pp. 278-291
-
-
Huang, Q.1
Wong, D.S.2
-
22
-
-
38149126356
-
Generic certificateless key encapsulation mechanism
-
In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
-
Huang, Q., Wong, D.S.: Generic certificateless key encapsulation mechanism. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) Information Security and Privacy (ACISP 2007). Lecture Notes in Computer Science, vol. 4586, pp. 215-299. Springer, Heidelberg (2007)
-
(2007)
Information Security and Privacy (ACISP 2007)
, vol.4586
, pp. 215-299
-
-
Huang, Q.1
Wong, D.S.2
-
23
-
-
38049007949
-
Self-generated-certificate public key encryption without pairing
-
In: Okamoto, T., Wang, X. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
-
Lai, J., Kou, K.: Self-generated-certificate public key encryption without pairing. In: Okamoto, T., Wang, X. (eds.) Public Key Cryptography-PKC 2007, Lecture Notes in Computer Science, vol. 4450, pp. 476-489. Springer, Heidelberg (2007)
-
(2007)
Public Key Cryptography-PKC 2007
, vol.4450
, pp. 476-489
-
-
Lai, J.1
Kou, K.2
-
24
-
-
33745833916
-
On constructing certificateless cryptosystems from identity based encryption
-
In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
-
Libert, B., Quisquater, J.J.: On constructing certificateless cryptosystems from identity based encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) Public Key Cryptography-PKC 2006. Lecture Notes in Computer Science, vol. 3958, pp. 474-490. Springer, Heidelberg (2006)
-
(2006)
Public Key Cryptography-PKC 2006
, vol.3958
, pp. 474-490
-
-
Libert, B.1
Quisquater, J.J.2
-
25
-
-
84876341103
-
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model
-
In: ACM Press, New York
-
Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security. ACM Press, New York (2007)
-
(2007)
Proceedings of the ACM Symposium on Information, Computer and Communications Security
-
-
Liu, J.K.1
Au, M.H.2
Susilo, W.3
-
26
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R.L., Shamir A., Adleman L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120-126 (1978)
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
27
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
In: Blakley, G.R., Chaum, D. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology-Crypto-84. Lecture Notes in Computer Science, vol. 196, pp. 47-53. Springer, Heidelberg (1984)
-
(1984)
Advances in Cryptology-Crypto -84
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
30
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
In: Cramer, R. (ed.) Lecture Notes in Computer Science Springer, Heidelberg
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) Advances in Cryptology-EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
Advances in Cryptology-EUROCRYPT 2005
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
31
-
-
33645584388
-
Generic construction of certificateless encryption
-
In: A.L. et al. (ed.) Lecture Notes in Computer Science Springer, Heidelberg
-
Yum, D.H., Lee, P.J.: Generic construction of certificateless encryption. In: A.L. et al. (ed.) Computational Science and Its Applications-ICCSA 2004: Part I. Lecture Notes in Computer Science, vol. 3043, pp. 802-811. Springer, Heidelberg (2004)
-
(2004)
Computational Science and Its Applications-ICCSA 2004: Part I
, vol.3043
, pp. 802-811
-
-
Yum, D.H.1
Lee, P.J.2
-
32
-
-
33645601534
-
Identity-based cryptography in public key management
-
In: Katsikas, S.K., Gritzalis, S., Lopez, J., (eds.) Lecture Notes in Computer Science Springer, Heidelberg
-
Yum, D.H., Lee, P.J.: Identity-based cryptography in public key management. In: Katsikas, S.K., Gritzalis, S., Lopez, J., (eds.) Public Key Infrastructure: 1st European PKI Workshop (EuroPKI 2004). Lecture Notes in Computer Science, vol. 3093, pp. 71-84. Springer, Heidelberg (2004)
-
(2004)
Public Key Infrastructure: 1st European PKI Workshop (EuroPKI 2004)
, vol.3093
, pp. 71-84
-
-
Yum, D.H.1
Lee, P.J.2
-
34
-
-
33746591632
-
Certificateless public-key signature: Security model and efficient construction
-
In: Zhou, J., Yung, M., Bao, F. (eds.) Springer, Heidelberg
-
Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless public-key signature: Security model and efficient construction. In: Zhou, J., Yung, M., Bao, F. (eds.) Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 3989, pp. 293-308. Springer, Heidelberg (2006)
-
(2006)
Applied Cryptography and Network Security. Lecture Notes in Computer Science
, vol.3989
, pp. 293-308
-
-
Zhang, Z.1
Wong, D.S.2
Xu, J.3
Feng, D.4
|