|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 12 occurrences of 12 keywords
|
|
|
Results
Found 34 publication records. Showing 34 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
180 | Toshihide Matsuda, Ryo Nishimaki, Akira Numayama, Keisuke Tanaka |
Security on Hybrid Encryption with the Tag-KEM/DEM Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 343-359, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
169 | Joonsang Baek, David Galindo, Willy Susilo, Jianying Zhou 0001 |
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 358-374, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
163 | Alexander W. Dent |
A Designer's Guide to KEMs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings, pp. 133-151, 2003, Springer, 3-540-20663-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
113 | Alexander W. Dent |
Hybrid Signcryption Schemes with Outsider Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 203-217, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
94 | Masayuki Abe, Yang Cui 0001, Hideki Imai, Kaoru Kurosawa |
Tag-KEM from Set Partial Domain One-Way Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 360-370, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
79 | Duong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien |
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, pp. 264-275, 2006, Springer, 3-540-35907-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
60 | Manuel Barbosa, Pooya Farshim |
Secure Cryptographic Workflow in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 379-393, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cryptographic Workflow, Key Encapsulation, Secret Sharing, Identity-Based Encryption |
59 | Bogdan Groza |
An Extension of the RSA Trapdoor in a KEM/DEM Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SYNASC ![In: Proceedings of the Ninth International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2007, Timisoara, Romania, September 26-29, 2007, pp. 182-187, 2007, IEEE Computer Society, 978-0-7695-3078-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup |
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 128-146, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Laila El Aimani |
Anonymity from Public Key Encryption to Undeniable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 217-234, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Encryption schemes, KEM/DEM, Convertible undeniable signatures, Anonymity, Generic construction |
33 | Yusuke Sakai 0001, Takahiro Matsuda 0002, Goichiro Hanaoka |
Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 101-D(11), pp. 2677-2687, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
33 | Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi 0001 |
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 34, pp. 84-91, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
33 | Yusuke Sakai 0001, Takahiro Matsuda 0002, Goichiro Hanaoka |
Tag-KEM/DEM framework for public-key encryption with non-interactive opening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISITA ![In: 2016 International Symposium on Information Theory and Its Applications, ISITA 2016, Monterey, CA, USA, October 30 - November 2, 2016, pp. 231-235, 2016, IEEE, 978-4-88552-309-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
33 | Yuan Chen 0008, Qingkuan Dong |
Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(18), pp. 3323-3334, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon 0002 |
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 606, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
33 | Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi 0001 |
A KEM/DEM-Based Construction for Secure and Anonymous Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC Workshops ![In: 39th Annual Computer Software and Applications Conference, COMPSAC Workshops 2015, Taichung, Taiwan, July 1-5, 2015, pp. 680-681, 2015, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon 0002 |
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers, pp. 411-422, 2015, Springer, 978-3-319-31874-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Yuan Chen 0008, Xiaofeng Chen 0001, Hui Li 0006 |
More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Grid Util. Comput. ![In: Int. J. Grid Util. Comput. 5(1), pp. 60-70, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Hitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga |
Randomness Leakage in the KEM/DEM Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1), pp. 191-199, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Yuan Chen 0008, Qingkuan Dong |
RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 7(8), pp. 1219-1231, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Yuan Chen 0008, Qingkuan Dong |
RCCA Security for KEM+DEM Style Hybrid Encryptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers, pp. 102-121, 2012, Springer, 978-3-642-38518-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Hitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga |
Randomness Leakage in the KEM/DEM Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 309-323, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa |
Tag-KEM/DEM: A New Framework for Hybrid Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(1), pp. 97-130, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Tag-KEM, Key encapsulation, Threshold encryption, Hybrid encryption |
33 | Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto |
A Universally Composable Secure Channel Based on the KEM-DEM Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1), pp. 28-38, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa |
Tag-KEM/DEM: A New Framework for Hybrid Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 27, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
33 | Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto |
A Universally Composable Secure Channel Based on the KEM-DEM Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 426-444, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Alexander W. Dent, Qiang Tang 0001 |
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 158-174, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay |
TCHo: A Hardware-Oriented Trapdoor Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 184-199, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hardware, linear feedback shift register, public-key cryptosystem, polynomial multiples, post-quantum cryptography |
26 | James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt |
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 274-292, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Rui Zhang 0002, Hideki Imai |
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 159-174, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Dennis Hofheinz, Eike Kiltz |
Secure Hybrid Encryption from Weakened Key Encapsulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 553-571, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Tor E. Bjørstad, Alexander W. Dent |
Building Better Signcryption Schemes with Tag-KEMs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 491-507, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Benoît Libert, Jean-Jacques Quisquater |
Identity Based Encryption Without Redundancy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 285-300, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ID-based encryption, redundancies, provable security |
26 | John Malone-Lee |
A General Construction for Simultaneous Signing and Encrypting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, pp. 116-135, 2005, Springer, 3-540-30276-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #34 of 34 (100 per page; Change: )
|
|