-
1
-
-
39149130011
-
Tag-KEM/DEM: A new framework for hybrid encryption
-
Abe, M., Gennaro, R., Kurosawa, K.: Tag-KEM/DEM: a new framework for hybrid encryption. Journal of Cryptology 21(1), 97-130 (2008)
-
(2008)
Journal of Cryptology
, vol.21
, Issue.1
, pp. 97-130
-
-
Abe, M.1
Gennaro, R.2
Kurosawa, K.3
-
2
-
-
0345490607
-
Certificateless public key cryptography
-
Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
-
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
3
-
-
84947237328
-
On the security of joint signature and encryption
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
An, J.H., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 83-107. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
4
-
-
62449111027
-
Certificateless signcryption
-
Tokyo, Japan, pp
-
Barbosa, M., Farshim, P.: Certificateless signcryption. In: ACM Symposium on Information, Computer and Communications Security-ASIACCS 2008, Tokyo, Japan, pp. 369-372 (2008)
-
(2008)
ACM Symposium on Information, Computer and Communications Security-ASIACCS
, pp. 369-372
-
-
Barbosa, M.1
Farshim, P.2
-
5
-
-
43249104504
-
Generic constructions of identity-based and certificateless KEMs
-
Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. Journal of Cryptology 21(2), 178-199 (2008)
-
(2008)
Journal of Cryptology
, vol.21
, Issue.2
, pp. 178-199
-
-
Bentahar, K.1
Farshim, P.2
Malone-Lee, J.3
Smart, N.P.4
-
6
-
-
33745859311
-
-
Bjørstad, T.E., Dent, A.W.: Building better signcryption schemes with tag-kEMs. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 491-507. Springer, Heidelberg (2006)
-
Bjørstad, T.E., Dent, A.W.: Building better signcryption schemes with tag-kEMs. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 491-507. Springer, Heidelberg (2006)
-
-
-
-
7
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 33(1), 167-226 (2003)
-
(2003)
SIAM Journal on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
8
-
-
33645962801
-
-
Dent, A.W.: Hybrid signcryption schemes with outsider security. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, 3650, pp. 203-217. Springer, Heidelberg (2005)
-
Dent, A.W.: Hybrid signcryption schemes with outsider security. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 203-217. Springer, Heidelberg (2005)
-
-
-
-
9
-
-
26444544161
-
-
Dent, A.W.: Hybrid signcryption schemes with insider security. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, 3574, pp. 253-266. Springer, Heidelberg (2005)
-
Dent, A.W.: Hybrid signcryption schemes with insider security. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 253-266. Springer, Heidelberg (2005)
-
-
-
-
10
-
-
70350653129
-
-
Li, F, Shirase, M, Takagi, T, Certificateless hybrid signcryption. Full version will be available in Cryptology ePrint Archive
-
Li, F., Shirase, M., Takagi, T.: Certificateless hybrid signcryption. Full version will be available in Cryptology ePrint Archive
-
-
-
-
11
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
12
-
-
49049093240
-
Insider-secure signcryption KEM/tag-KEM schemes without random oracles
-
Barcelona, Spain, pp
-
Tan, C.H.: Insider-secure signcryption KEM/tag-KEM schemes without random oracles. In: The Third International Conference on Availability, Reliability and Security-ARES 2008, Barcelona, Spain, pp. 1275-1281 (2008)
-
(2008)
The Third International Conference on Availability, Reliability and Security-ARES
, pp. 1275-1281
-
-
Tan, C.H.1
-
13
-
-
63449122349
-
Digital signcryption or how to achieve cost (Signature & encryption) << cost(Signature) + cost(Encryption)
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) << cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
|