Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | David Derler, Daniel Slamanig |
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 455-474, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yong Yu 0002, Yafang Zhang, Yi Mu 0001, Willy Susilo, Hongyu Liu |
Provably Secure Identity Based Provable Data Possession. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 310-325, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Boyen, Qinyi Li |
Attribute-Based Encryption for Finite Automata from LWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 247-267, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Maciej Skorski |
On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 391-411, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhiwei Wang, Siu-Ming Yiu |
Attribute-Based Encryption Resilient to Auxiliary Input. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 371-390, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yohei Watanabe 0001, Junji Shikata |
Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 489-502, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Karim Dahmani, Mahjoub Langar, Riadh Robbana |
A Formal Dynamic Verification of Choreographed Web Services Conversations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 340-353, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng |
Unique Signature with Short Output from CDH Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 475-488, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay |
Functional Signcryption: Notion, Construction, and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 268-288, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Naito 0001 |
Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 167-182, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Man Ho Au, Atsuko Miyaji (eds.) |
Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![Springer, 978-3-319-26058-7 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zongyang Zhang, Yu Chen 0003, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao |
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 435-454, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Serge Vaudenay |
On Privacy for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 3-20, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Katsuyuki Takashima, Atsushi Takayasu |
Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 412-431, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Suvradip Chakraborty, Goutam Paul 0001, C. Pandu Rangan |
Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 149-166, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto |
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 127-146, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bernardo Machado David, Rafael Dowsley, Raj S. Katti, Anderson C. A. Nascimento |
Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 354-367, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Donghoon Chang, Sumesh Manjunath R., Somitra Kumar Sanadhya |
PPAE: Practical Parazoa Authenticated Encryption Family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 198-211, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Noboru Kunihiro |
An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 61-81, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges |
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, pp. 23-42, 2015, Springer, 978-3-319-26058-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nilanjan Datta, Mridul Nandi |
Equivalence between MAC, WCR and PRF for Blockcipher Based Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 300-308, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shoichi Hirose, Hidenori Kuwakado |
A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 71-86, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Peeter Laud, Alisa Pankova |
Verifiable Computation in Multiparty Protocols with Honest Majority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 146-161, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jiageng Chen, Atsuko Miyaji, Chunhua Su |
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 103-116, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Yoneyama |
Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 317-325, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tapas Pandit, Sumit Kumar Pandey, Rana Barua |
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 274-290, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guangyao Zhao, Lei Cheng, Chao Li 0002, Ruilin Li, Xuan Shen |
On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 40-54, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu |
Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 130-145, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Somindu C. Ramanna, Palash Sarkar 0001 |
Efficient (Anonymous) Compact HIBE from Standard Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 243-258, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yohei Watanabe 0001, Junji Shikata |
Timed-Release Computational Secret Sharing Scheme and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 326-333, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Haiyang Xue, Xianhui Lu, Bao Li 0001, Yamin Liu |
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 162-177, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yanjiang Yang, Haibing Lu, Jian Weng 0001, Youcheng Zhang, Kouichi Sakurai |
Fine-Grained Conditional Proxy Re-Encryption and Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 206-222, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lukasz Krzywiecki |
Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 334-341, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Yoneyama, Goichiro Hanaoka |
Compact Public Key Encryption with Minimum Ideal Property of Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 178-193, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hui Cui 0001, Yi Mu 0001, Man Ho Au |
Complete Robustness in Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 342-349, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mehdi Tibouchi |
Impossibility of Surjective Icart-Like Encodings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 29-39, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu (eds.) |
Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![Springer, 978-3-319-12474-2 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Reza Reyhanitabar, Serge Vaudenay, Damian Vizár |
Misuse-Resistant Variants of the OMD Authenticated Encryption Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 55-70, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rongxing Lu, Xiaodong Lin 0001, Jun Shao 0001, Kaitai Liang |
RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 194-205, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuyu Wang 0001, Keisuke Tanaka |
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 117-129, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla |
Password-Based Authenticated Key Exchange: An Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 1-9, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto |
A Short Fail-Stop Signature Scheme from Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 309-316, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shoichi Hirose, Hidenori Kuwakado |
Forward-Secure Sequential Aggregate Message Authentication Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 87-102, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Koji Nuida |
How to Use Pseudorandom Generators in Unconditional Security Settings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 291-299, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Jesper Buus Nielsen |
Adaptive versus Static Security in the UC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 10-28, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shuichi Katsumata, Noboru Kunihiro |
Constructing Subspace Membership Encryption through Inner Product Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 223-242, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yinghui Zhang 0002, Dong Zheng 0001, Xiaofeng Chen 0001, Jin Li 0002, Hui Li 0006 |
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 259-273, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Y. Sreenivasa Rao, Ratna Dutta |
Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 288-308, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tsz Hon Yuen, Cong Zhang 0001, Sherman S. M. Chow, Joseph K. Liu |
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 139-153, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Angsuman Das, Sabyasachi Dutta, Avishek Adhikari |
Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 104-120, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kazuhiko Minematsu |
A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 221-238, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Prabhanjan Ananth, Raghav Bhaskar |
Non Observability in the Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 86-103, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Cristian Ene, Clémentine Gritti, Yassine Lakhnech |
CIL Security Proof for a Password-Based Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 59-85, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dingding Jia, Xianhui Lu, Bao Li 0001, Qixiang Mei |
RKA Secure PKE Based on the DDH and HR Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 271-287, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Serge Vaudenay |
On Modeling Terrorist Frauds - Addressing Collusion in Distance Bounding Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 1-20, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata |
Improved Authenticity Bound of EAX, and Refinements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 184-201, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hui Cui 0001, Yi Mu 0001, Man Ho Au |
Anonymous Signcryption against Linear Related-Key Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 165-183, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hai Huang |
Authenticated Key Exchange Protocols Based on Factoring Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 21-37, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Willy Susilo, Reza Reyhanitabar (eds.) |
Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![Springer, 978-3-642-41226-4 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xianhui Lu, Bao Li 0001, Yamin Liu |
How to Remove the Exponent GCD in HK09. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 239-248, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kazumaro Aoki, Kan Yasuda |
The Security of the OCB Mode of Operation without the SPRP Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 202-220, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nirattaya Khamsemanan, William E. Skeith III |
Translation-Randomizable Distributions via Random Walks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 249-270, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka |
Factoring-Based Proxy Re-Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 309-329, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ioana Boureanu, Serge Vaudenay |
Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 121-138, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | S. Sree Vivek, S. Sharmila Deva Selvi, Layamrudhaa Renganathan Venkatesan, C. Pandu Rangan |
Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 38-58, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Weiwei Liu 0005, Guomin Yang, Yi Mu 0001, Jiannan Wei |
k-time Proxy Signature: Formal Definition and Efficient Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 154-164, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hui Guo, Zhenfeng Zhang, Jiang Zhang 0001, Cheng Chen |
Towards a Secure Certificateless Proxy Re-Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 330-346, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zheng Yang 0005, Jörg Schwenk |
Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 264-275, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yu Chen 0003, Zongyang Zhang, Dongdai Lin, Zhenfu Cao |
Anonymous Identity-Based Hash Proof System and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 143-160, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Oana Ciobotaru |
On the (Non-)Equivalence of UC Security Notions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 104-124, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yunmei Zhang, Joseph K. Liu, Xinyi Huang 0001, Man Ho Au, Willy Susilo |
Efficient Escrow-Free Identity-Based Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 161-174, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Cheng Chen, Zhenfeng Zhang, Dengguo Feng |
Fully Secure Doubly-Spatial Encryption under Simple Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 253-263, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Margus Niitsoo |
Deterministic Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 88-103, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Yoshino, Noboru Kunihiro, Ken Naganuma, Hisayoshi Sato |
Symmetric Inner-Product Predicate Encryption Based on Three Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 215-234, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bo Yang 0003, Mingwu Zhang |
LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 125-142, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xingwen Zhao, Hui Li 0006 |
Codes Based Tracing and Revoking Scheme with Constant Ciphertext. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 318-335, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | ZhaoHui Tang, Hoon Wei Lim, Huaxiong Wang |
Revisiting a Secret Sharing Approach to Network Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 300-317, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shengke Zeng, Zhiguang Qin, Qing Lu, Qinyi Li |
Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 21-34, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mototsugu Nishioka |
Perfect Keyword Privacy in PEKS Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 175-192, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe |
Tools over Bilinear Groups for Modular Design of Cryptographic Tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 1, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ioana Boureanu, Serge Vaudenay |
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 70-87, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu 0002 (eds.) |
Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![Springer, 978-3-642-33271-5 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Cheng Chen, Jie Chen 0021, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng |
Combined Public-Key Schemes: The Case of ABE and ABS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 53-69, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Y. W. Liu, Duncan S. Wong |
One-Move Convertible Nominative Signature in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 2-20, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tapas Pandit, Rana Barua |
Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 193-214, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Takanori Suga, Takashi Nishide, Kouichi Sakurai |
Secure Keyword Search Using Bloom Filter with Specified Character Positions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 235-252, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Reza Reyhanitabar, Willy Susilo |
On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 288-299, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yanfei Guo, Zhenfeng Zhang |
Authenticated Key Exchange with Entities from Different Settings and Varied Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 276-287, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan |
ID Based Signcryption Scheme in Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, pp. 35-52, 2012, Springer, 978-3-642-33271-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga |
Weak Oblivious Transfer from Strong One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 34-51, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Boyen, Xiaofeng Chen 0001 (eds.) |
Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![Springer, 978-3-642-24315-8 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bingsheng Zhang |
Simulatable Adaptive Oblivious Transfer with Statistical Receiver's Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 52-67, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Duong Hieu Phan, Viet Cuong Trinh |
Identity-Based Trace and Revoke Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 204-221, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rong Cheng, Bo Zhang 0072, Fangguo Zhang |
Secure Obfuscation of Encrypted Verifiable Encrypted Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 188-203, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga |
Randomness Leakage in the KEM/DEM Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 309-323, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi |
Efficient Identity-Based Signcryption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 120-137, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tsz Hon Yuen, Duncan S. Wong, Willy Susilo, Qiong Huang 0001 |
Concurrent Signatures with Fully Negotiable Binding Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 170-187, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang 0031, Kazuo Ohta |
Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 281-296, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Vipul Goyal |
Secure Composition of Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 2, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bingsheng Zhang |
Generic Constant-Round Oblivious Sorting Algorithm for MPC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 240-256, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|