-
1
-
-
84937579774
-
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES
-
Topics in Cryptology - CT-RSA 2001 The Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
-
M. Abdalla, M. Bellare, and P. Rogaway. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. In D. Naccache, editor, CT-RSA, volume 2020 of Lecture Notes in Computer Science, pages 143-158. Springer, 2001. (Pubitemid 33255161)
-
(2001)
Lecture Notes in Computer Science
, Issue.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
3
-
-
0010254147
-
Minimizing the use of random oracles in authenticated encryption schemes
-
M. Bellare and P. Rogaway. Minimizing the use of random oracles in authenticated encryption schemes. In Y. Han, T. Okamoto, and S. Qing, editors, ICICS, volume 1334 of Lecture Notes in Computer Science, pages 1-16. Springer, 1997. (Pubitemid 127148029)
-
(1997)
Lecture Notes in Computer Science
, Issue.1334
, pp. 1-16
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
35048841300
-
Efficient selective-id secure identity-based encryption without random oracles
-
C. Cachin and J. Camenisch, editors, volume 3027 of Lecture Notes in Computer Science, Springer
-
D. Boneh and X. Boyen. Efficient selective-id secure identity-based encryption without random oracles. In C. Cachin and J. Camenisch, editors, EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 223-238. Springer, 2004.
-
(2004)
EUROCRYPT
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
6
-
-
35048835319
-
Secure identity based encryption without random oracles
-
M. K. Franklin, editor, volume 3152 of Lecture Notes in Computer Science, Springer
-
D. Boneh and X. Boyen. Secure identity based encryption without random oracles. In M. K. Franklin, editor, CRYPTO, volume 3152 of Lecture Notes in Computer Science, pages 443-459. Springer, 2004.
-
(2004)
CRYPTO
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
7
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. SIAM J. Comput., 32(3):586-615, 2003.
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
8
-
-
67650159910
-
A tapestry of identity-based encryption: Practical frameworks compared
-
X. Boyen. A tapestry of identity-based encryption: practical frameworks compared. IJACT, 1(1):3-21, 2008.
-
(2008)
IJACT
, vol.1
, Issue.1
, pp. 3-21
-
-
Boyen, X.1
-
9
-
-
77954516750
-
Identity-based encryption based on DHIES
-
D. Feng, D. A. Basin, and P. Liu, editors, ACM
-
Y. Chen, M. Charlemagne, Z. Guan, J. bin Hu, and Z. Chen. Identity-based encryption based on DHIES. In D. Feng, D. A. Basin, and P. Liu, editors, ASIACCS, pages 82-88. ACM, 2010.
-
(2010)
ASIACCS
, pp. 82-88
-
-
Chen, Y.1
Charlemagne, M.2
Guan, Z.3
Hu, J.B.4
Chen, Z.5
-
10
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
B. Honary, editor, volume 2260 of Lecture Notes in Computer Science, Springer
-
C. Cocks. An identity based encryption scheme based on quadratic residues. In B. Honary, editor, IMA Int. Conf., volume 2260 of Lecture Notes in Computer Science, pages 360-363. Springer, 2001.
-
(2001)
IMA Int. Conf.
, pp. 360-363
-
-
Cocks, C.1
-
11
-
-
77649327985
-
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
-
B. Preneel, editor, volume 1807 of Lecture Notes in Computer Science, Springer
-
N. Courtois, A. Klimov, J. Patarin, and A. Shamir. Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In B. Preneel, editor, EUROCRYPT, volume 1807 of Lecture Notes in Computer Science, pages 392-407. Springer, 2000.
-
(2000)
EUROCRYPT
, pp. 392-407
-
-
Courtois, N.1
Klimov, A.2
Patarin, J.3
Shamir, A.4
-
12
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
C. Dwork, editor, ACM
-
C. Gentry, C. Peikert, and V. Vaikuntanathan. Trapdoors for hard lattices and new cryptographic constructions. In C. Dwork, editor, STOC, pages 197-206. ACM, 2008.
-
(2008)
STOC
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
13
-
-
84957060922
-
Cryptanalysis of the hfe public key cryptosystem by relinearization
-
M. J. Wiener, editor, volume 1666 of Lecture Notes in Computer Science, Springer
-
A. Kipnis and A. Shamir. Cryptanalysis of the hfe public key cryptosystem by relinearization. In M. J. Wiener, editor, CRYPTO, volume 1666 of Lecture Notes in Computer Science, pages 19-30. Springer, 1999.
-
(1999)
CRYPTO
, pp. 19-30
-
-
Kipnis, A.1
Shamir, A.2
-
14
-
-
26444602504
-
Identity based encryption without redundancy
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
B. Libert and J.-J. Quisquater. Identity based encryption without redundancy. In J. Ioannidis, A. D. Keromytis, and M. Yung, editors, ACNS, volume 3531 of Lecture Notes in Computer Science, pages 285-300, 2005. (Pubitemid 41422123)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 285-300
-
-
Libert, B.1
Quisquater, J.-J.2
-
15
-
-
79956012817
-
Some recent progress in lattice-based cryptography
-
O. Reingold, editor, volume 5444 of Lecture Notes in Computer Science, Springer
-
C. Peikert. Some recent progress in lattice-based cryptography. In O. Reingold, editor, TCC, volume 5444 of Lecture Notes in Computer Science, page 72. Springer, 2009.
-
(2009)
TCC
, pp. 72
-
-
Peikert, C.1
-
17
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO, pages 47-53, 1984.
-
(1984)
CRYPTO
, pp. 47-53
-
-
Shamir, A.1
-
18
-
-
85115374351
-
Algorithms for quantum computation: Discrete logarithms and factoring
-
IEEE
-
P. W. Shor. Algorithms for quantum computation: Discrete logarithms and factoring. In FOCS, pages 124-134. IEEE, 1994.
-
(1994)
FOCS
, pp. 124-134
-
-
Shor, P.W.1
-
19
-
-
35248891001
-
Access control using pairing based cryptography
-
M. Joye, editor, volume 2612 of Lecture Notes in Computer Science, Springer
-
N. P. Smart. Access control using pairing based cryptography. In M. Joye, editor, CT-RSA, volume 2612 of Lecture Notes in Computer Science, pages 111-121. Springer, 2003.
-
(2003)
CT-RSA
, pp. 111-121
-
-
Smart, N.P.1
-
20
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
B. Waters. Efficient identity-based encryption without random oracles. In R. Cramer, editor, EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, pages 114-127. Springer, 2005. (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
21
-
-
79956056973
-
Applications of multivariate quadratic public key systems
-
H. Federrath, editor, volume 62 of LNI, GI
-
C. Wolf and B. Preneel. Applications of multivariate quadratic public key systems. In H. Federrath, editor, Sicherheit, volume 62 of LNI, pages 413-424. GI, 2005.
-
(2005)
Sicherheit
, pp. 413-424
-
-
Wolf, C.1
Preneel, B.2
|