×

Found 16 Documents (Results 1–16)

Two-pass authenticated key exchange with explicit authentication and tight security. (English) Zbl 1511.94184

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12492, 785-814 (2020).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Security model and analysis of FHMQV, revisited. (English) Zbl 1347.94048

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 255-269 (2014).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Identity-based encryption secure against selective opening chosen-ciphertext attack. (English) Zbl 1326.94107

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 77-92 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. (English) Zbl 1312.94071

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 84-100 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Chosen-ciphertext secure proxy re-encryption without pairings. (English) Zbl 1362.94026

Franklin, Matthew K. (ed.) et al., Cryptology and network security. 7th international conference, CANS 2008, Hong-Kong, China, December 2–4, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89640-1/pbk). Lecture Notes in Computer Science 5339, 1-17 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based threshold key-insulated encryption without random oracles. (English) Zbl 1153.94437

Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 203-220 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based key-insulated signature with secure key-updates. (English) Zbl 1172.94629

Lipmaa, Helger (ed.) et al., Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). Lecture Notes in Computer Science 4318, 13-26 (2006).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based parallel key-insulated encryption without random oracles: Security notions and construction. (English) Zbl 1175.94120

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 409-423 (2006).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software