|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2 occurrences of 2 keywords
|
|
|
Results
Found 16 publication records. Showing 16 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
170 | Chik How Tan |
Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1275-1281, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Signcryption KEM scheme, Signcryption Tag-KEM scheme |
168 | Toshihide Matsuda, Ryo Nishimaki, Akira Numayama, Keisuke Tanaka |
Security on Hybrid Encryption with the Tag-KEM/DEM Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 343-359, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
151 | Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata |
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 259-273, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
147 | Masayuki Abe, Yang Cui 0001, Hideki Imai, Kaoru Kurosawa |
Tag-KEM from Set Partial Domain One-Way Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 360-370, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
118 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Efficient Signcryption Key Encapsulation without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 47-59, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Hybrid signcryption, KEM, tag-KEM, standard model |
76 | Duong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien |
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, pp. 264-275, 2006, Springer, 3-540-35907-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
70 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa |
Tag-KEM/DEM: A New Framework for Hybrid Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(1), pp. 97-130, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Tag-KEM, Key encapsulation, Threshold encryption, Hybrid encryption |
52 | Xiangxue Li, Haifeng Qian, Yu Yu 0001, Jian Weng 0001, Yuan Zhou 0008 |
Signcryption KEM/tag-KEM, revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(17), pp. 3067-3082, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
52 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup |
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 128-146, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Yusuke Sakai 0001, Takahiro Matsuda 0002, Goichiro Hanaoka |
Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 101-D(11), pp. 2677-2687, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Yusuke Sakai 0001, Takahiro Matsuda 0002, Goichiro Hanaoka |
Tag-KEM/DEM framework for public-key encryption with non-interactive opening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISITA ![In: 2016 International Symposium on Information Theory and Its Applications, ISITA 2016, Monterey, CA, USA, October 30 - November 2, 2016, pp. 231-235, 2016, IEEE, 978-4-88552-309-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Xiangxue Li, Haifeng Qian, Yu Yu 0001, Jian Weng 0001, Yuan Zhou 0008 |
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings, pp. 167-184, 2013, Springer, 978-3-319-02725-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Masayuki Abe, Yang Cui 0001, Hideki Imai, Kaoru Kurosawa |
Tag-KEM from Set Partial Domain One-Way Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1), pp. 42-52, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Maki Yoshida, Toru Fujiwara |
On the Security of Tag-KEM for Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCAN@ICALP ![In: Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2006, Venice, Italy, July 16, 2006, pp. 83-91, 2006, Elsevier. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa |
Tag-KEM/DEM: A New Framework for Hybrid Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 27, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
23 | Rui Zhang 0002, Hideki Imai |
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 159-174, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #16 of 16 (100 per page; Change: )
|
|