|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7345 occurrences of 1913 keywords
|
|
|
Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Nuttapong Attrapadung, Benoît Libert |
Homomorphic Network Coding Signatures in the Standard Model. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Nuttapong Attrapadung, Benoît Libert, Elie de Panafieu |
Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Takahiro Matsuda 0002, Kanta Matsuura |
Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Roberto Maria Avanzi, Clemens Heuberger |
Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Amit Sahai, Hakan Seyalioglu |
Fully Secure Accountable-Authority Identity-Based Encryption. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik |
(If) Size Matters: Size-Hiding Private Set Intersection. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret |
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Junzuo Lai, Robert H. Deng, Shengli Liu 0001 |
Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Shota Yamada 0001, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro |
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Brent Waters |
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Rishiraj Bhattacharyya, Avradip Mandal |
On the Impossibility of Instantiating PSS in the Standard Model. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Shai Halevi, Hugo Krawczyk |
One-Pass HMQV and Asymmetric Key-Wrapping. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Phong Q. Nguyen, David Pointcheval (eds.) |
Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Sergei N. Molotkov |
Phase-time coding quantum cryptography. |
Quantum Cryptography and Computing |
2010 |
DBLP DOI BibTeX RDF |
|
28 | John Dubois |
Commercial potential of quantum cryptography. |
Quantum Cryptography and Computing |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Amir Moradi 0001, Axel Poschmann |
Lightweight Cryptography and DPA Countermeasures: A Survey. |
Financial Cryptography Workshops |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Ueli Maurer |
Constructive Cryptography - A Primer. |
Financial Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Daniel W. Engels, Xinxin Fan, Guang Gong, Honggang Hu, Eric M. Smith |
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. |
Financial Cryptography Workshops |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen |
Text Search Protocols with Simulation Based Security. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Zhenfu Cao, Ivan Visconti, Zongyang Zhang |
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Sven Laur, Helger Lipmaa |
On the Feasibility of Consistent Computations. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa |
Security of Encryption Schemes in Weakened Random Oracle Models. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Toshihide Matsuda, Ryo Nishimaki, Keisuke Tanaka |
CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Steven D. Galbraith, Raminder S. Ruprai |
Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Xavier Boyen |
Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Mathias Herrmann, Alexander May 0001 |
Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Charles Faugère, Pierre-Jean Spaenlehauer |
Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Robert Granger, Michael Scott |
Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Charles Faugère, Raphaël Marinier, Guénaël Renault |
Implicit Factoring with Shared Most Significant and Middle Bits. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Craig Costello, Tanja Lange 0001, Michael Naehrig |
Faster Pairing Computations on Curves with High-Degree Twists. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Nigel P. Smart, Frederik Vercauteren |
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Javier Herranz, Fabien Laguillaumie, Carla Ràfols |
Constant Size Ciphertexts in Threshold Attribute-Based Encryption. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Nuttapong Attrapadung, Benoît Libert |
Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Carmit Hazay, Kobbi Nissim |
Efficient Set Operations in the Presence of Malicious Adversaries. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Petros Mol, Scott Yilek |
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Wei Wu 0001, Yang Xiang 0001 |
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schröder |
Confidential Signatures and Deterministic Signcryption. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Ali Bagherzandi, Stanislaw Jarecki |
Identity-Based Aggregate and Multi-Signature Schemes Based on RSA. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder |
Unlinkability of Sanitizable Signatures. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Reza Rezaeian Farashahi, Marc Joye |
Efficient Arithmetic on Hessian Curves. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Takuya Hayashi 0001, Naoyuki Shinohara, Lihua Wang 0001, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi |
Solving a 676-Bit Discrete Logarithm Problem in GF(36n). |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi |
Groth-Sahai Proofs Revisited. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin |
Secure Network Coding over the Integers. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | David Mandell Freeman, Oded Goldreich 0001, Eike Kiltz, Alon Rosen, Gil Segev 0001 |
More Constructions of Lossy and Correlation-Secure Trapdoor Functions. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup |
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Jens Groth, Aggelos Kiayias, Helger Lipmaa |
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman |
Preventing Pollution Attacks in Multi-source Network Coding. |
Public Key Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Stanislaw Jarecki, Gene Tsudik (eds.) |
Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Antoine Joux |
Introduction to Identity-Based Cryptography. |
Identity-Based Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Olivier Billet, Jintai Ding |
Overview of Cryptanalysis Techniques in Multivariate Public Key Cryptography. |
Gröbner Bases, Coding, and Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Massimiliano Sala |
Gröbner Bases, Coding, and Cryptography: a Guide to the State-of-Art. |
Gröbner Bases, Coding, and Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Helena Handschuh, Stefan Lucks, Bart Preneel, Phillip Rogaway |
09031 Abstracts Collection - Symmetric Cryptography. |
Symmetric Cryptography |
2009 |
DBLP BibTeX RDF |
|
28 | Helena Handschuh, Stefan Lucks, Bart Preneel, Phillip Rogaway |
09031 Executive Summary - Symmetric Cryptography. |
Symmetric Cryptography |
2009 |
DBLP BibTeX RDF |
|
28 | Koichiro Akiyama, Yasuhiro Goto, Hideyuki Miyake |
An Algebraic Surface Cryptosystem. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Section, Public-key Cryptosystem, Algebraic Surface |
28 | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto |
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Group Key Exchange, Insider Attacks, Key Compromise Impersonation |
28 | Patrick Longa, Catherine H. Gebotys |
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
multibase non-adjacent form, fractional window, Elliptic curve cryptosystem, scalar multiplication, double base number system |
28 | Sebastiaan de Hoogh, Berry Schoenmakers, Boris Skoric, José Villegas |
Verifiable Rotation of Homomorphic Encryptions. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Paz Morillo, Carla Ràfols |
The Security of All Bits Using List Decoding. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
bit security, one-way function, list decoding |
28 | Minkyu Kim, Jung Hee Cheon, Jin Hong 0001 |
Subset-Restricted Random Walks for Pollard rho Method on Fpm. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Pollard rho method, pairing, normal basis, discrete logarithm problem |
28 | Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto |
Compact CCA-Secure Encryption for Messages of Arbitrary Length. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Ivan Damgård, Martin Geisler 0001, Mikkel Krøigaard, Jesper Buus Nielsen |
Asynchronous Multiparty Computation: Theory and Implementation. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Toru Nakanishi 0001, Hiroki Fujii, Yuta Hira, Nobuo Funabiki |
Revocable Group Signature Schemes with Constant Costs for Signing and Verifying. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki |
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Alexander May 0001, Maike Ritzenhofen |
Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Factoring with an oracle, lattices |
28 | Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy |
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Blind identity-based encryption, public key encryption with keyword search, searchable encryption |
28 | Scott E. Coull, Matthew Green 0001, Susan Hohenberger |
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Sherman S. M. Chow |
Removing Escrow from Identity-Based Encryption. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Jun Shao, Zhenfu Cao |
CCA-Secure Proxy Re-encryption without Pairings. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance |
28 | Ivan Damgård, Gert Læssøe Mikkelsen |
On the Theory and Practice of Personal Digital Signatures. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Pascal Junod, Alexandre Karlov, Arjen K. Lenstra |
Improving the Boneh-Franklin Traitor Tracing Scheme. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Boneh-Franklin traitor tracing, Guruswami-Sudan algorithm, Reed-Solomon codes, Berlekamp-Massey algorithm |
28 | Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schröder, Florian Volk |
Security of Sanitizable Signatures Revisited. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Marc Fischlin, Dominique Schröder |
Security of Blind Signatures under Aborts. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Aggelos Kiayias, Hong-Sheng Zhou |
Zero-Knowledge Proofs with Witness Elimination. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Benoît Libert, Damien Vergnaud |
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
efficiency, traceability, Identity-based encryption |
28 | Jan Camenisch, Markulf Kohlweiss, Claudio Soriente |
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
revocation, anonymous credentials, dynamic accumulators |
28 | Brian J. Matt |
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Pairing-based signatures, Wireless networks, Identity-based signatures, Short signatures, Batch verification |
28 | Dan Boneh, David Mandell Freeman, Jonathan Katz, Brent Waters |
Signing a Linear Subspace: Signature Schemes for Network Coding. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Hossein Ghodosi, Josef Pieprzyk |
Multi-Party Computation with Omnipresent Adversary. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Omnipresent Adversary, Proactive Secret Sharing, t-resilient Protocols, t-private Protocols, Multi-Party Computation |
28 | Mathias Herrmann, Gregor Leander |
A Practical Key Recovery Attack on Basic TCHo. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
TCHo, stream cipher, chosen ciphertext attack |
28 | Ronald Cramer (eds.) |
Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Yi-Ru Liu, Wen-Guey Tzeng |
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Broadcast encryption, collusion, polynomial interpolation |
28 | Éric Levieil, David Naccache |
Cryptographic Test Correction. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Thomas Plantard, Willy Susilo, Khin Than Win |
A Digital Signature Scheme Based on CVPinfinity. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Dario Catalano, Mario Di Raimondo, Dario Fiore 0001, Rosario Gennaro |
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Vadim Lyubashevsky |
Lattice-Based Identification Schemes Secure Under Active Attacks. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Akira Numayama, Toshiyuki Isshiki, Keisuke Tanaka |
Security of Digital Signature Schemes in Weakened Random Oracle Models. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
digital signature, collision, random oracle model, preimage |
28 | Sungwook Kim, Jung Hee Cheon |
A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Discrete Logarithm Problem with Low Hamming Weight Product (LHWP) Exponents, Parameterized Splitting Systems |
28 | Miaoqing Huang, Kris Gaj, Soonhak Kwon, Tarek A. El-Ghazawi |
An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
MWR2MM Algorithm, Field Programmable Gate Arrays, Montgomery Multiplication |
28 | James Birkett, Alexander W. Dent |
Relations Among Notions of Plaintext Awareness. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Moses D. Liskov, Silvio Micali |
Online-Untransferable Signatures. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Carmine Ventre, Ivan Visconti |
Completely Non-malleable Encryption Revisited. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Petros Mol, Moti Yung |
Recovering NTRU Secret Key from Inversion Oracles. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
NTRUEncrypt, Inversion Oracles, Universal Breaking, Public-Key Cryptanalysis |
28 | Alexander W. Dent, Benoît Libert, Kenneth G. Paterson |
Certificateless Encryption Schemes Strongly Secure in the Standard Model. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
strong security, standard model, certificateless encryption |
28 | Steven D. Galbraith, Eric R. Verheul |
An Analysis of the Vector Decomposition Problem. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Vector decomposition problem, generalised discrete logarithm problem, elliptic curves, Diffie-Hellman problem |
28 | Sven Laur, Sylvain Pasini |
SAS-Based Group Authentication and Key Agreement Protocols. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Groups, key agreement, message authentication, multi-party |
28 | Alexander May 0001, Maike Ritzenhofen |
Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Chinese Remaindering, Coppersmith’s method, Håstad’s attack, systems of univariate modular polynomials |
28 | Benoît Libert, Damien Vergnaud |
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
unidirectionality, standard model, chosen-ciphertext security, proxy re-encryption |
28 | Sebastian Faust, Emilia Käsper, Stefan Lucks |
Efficient Simultaneous Broadcast. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini |
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Patrick Longa, Ali Miri |
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
point operation, precomputation scheme, Elliptic curve cryptosystem, scalar multiplication, composite operation |
|
|