Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("random oracle model")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 19 of 19

  • Page / 1
Export

Selection :

  • and

Short signatures in the random oracle modelGRANBOULAN, Louis.Lecture notes in computer science. 2002, pp 364-378, issn 0302-9743, isbn 3-540-00171-9, 15 p.Conference Paper

Hierarchical ID-based cryptographyGENTRY, Craig; SILVERBERG, Alice.Lecture notes in computer science. 2002, pp 548-566, issn 0302-9743, isbn 3-540-00171-9, 19 p.Conference Paper

Group Diffie-Hellman key exchange secure against dictionary attacksBRESSON, Emmanuel; CHEVASSUT, Olivier; POINTCHEVAL, David et al.Lecture notes in computer science. 2002, pp 497-514, issn 0302-9743, isbn 3-540-00171-9, 18 p.Conference Paper

Identity-Based Parallel Key-Insulated Signature Without Random OraclesJIAN WENG; LI, Xiang-Xue; CHEN, Ke-Fei et al.Journal of information science and engineering. 2008, Vol 24, Num 4, pp 1143-1157, issn 1016-2364, 15 p.Article

Verifiably encrypted short signatures from bilinear mapsZUHUA SHAO.Annales des télécommunications. 2012, Vol 67, Num 9-10, pp 437-445, issn 0003-4347, 9 p.Article

Provably secure non-interactive key distribution based on pairingsDUPONT, Régis; ENGE, Andreas.Discrete applied mathematics. 2006, Vol 154, Num 2, pp 270-276, issn 0166-218X, 7 p.Conference Paper

Provably secure proxy-protected signature schemes based on factoringYUAN ZHOU; ZHENFU CAO; RONGXING LU et al.Applied mathematics and computation. 2005, Vol 164, Num 1, pp 83-98, issn 0096-3003, 16 p.Article

Certificate-based fair exchange protocol of signatures from pairingsZUHUA SHAO.Computer networks (1999). 2008, Vol 52, Num 16, pp 3075-3084, issn 1389-1286, 10 p.Article

Secure Integration of Asymmetric and Symmetric Encryption SchemesFUJISAKI, Eiichiro; OKAMOTO, Tatsuaki.Journal of cryptology. 2013, Vol 26, Num 1, pp 80-101, issn 0933-2790, 22 p.Article

Certificateless multi-proxy signatureZHENGPING JIN; QIAOYAN WEN.Computer communications. 2011, Vol 34, Num 3, pp 344-352, issn 0140-3664, 9 p.Article

Tuning a two-round group key agreementWEIZHENG GAO; NEUPANE, Kashi; STEINWANDT, Rainer et al.International journal of information security (Print). 2014, Vol 13, Num 5, pp 467-476, issn 1615-5262, 10 p.Article

Efficient ID-based multiproxy multisignature without bilinear maps in ROMTIWARI, Namita; PADHYE, Sahadeo; DEBIAO HE et al.Annales des télécommunications. 2013, Vol 68, Num 3-4, pp 231-237, issn 0003-4347, 7 p.Article

Improved convertible authenticated encryption scheme with provable securityLIN, Han-Yu; HSU, Chien-Lung; HUANG, Shih-Kun et al.Information processing letters. 2011, Vol 111, Num 13, pp 661-666, issn 0020-0190, 6 p.Article

Versatile identity-based signatures for authentication in multi-user settingsXI SUN; ZHENGTAO JIANG; MEIRONG ZHOU et al.International journal of grid and utility computing (Print). 2014, Vol 5, Num 3, pp 156-164, issn 1741-847X, 9 p.Article

Public-key searchable encryption from latticesCHANGJIANG HOU; FEI LIU; HONGTAO BAI et al.International journal of high performance systems architecture (Print). 2014, Vol 5, Num 1, pp 25-32, issn 1751-6528, 8 p.Conference Paper

Efficient and short certificateless signatures secure against realistic adversariesTSO, Raylin; XUN YI; XINYI HUANG et al.Journal of supercomputing. 2011, Vol 55, Num 2, pp 173-191, issn 0920-8542, 19 p.Article

Provable certificateless generalized signcryption schemeCAIXUE ZHOU; WAN ZHOU; XIWEI DONG et al.Designs, codes and cryptography. 2014, Vol 71, Num 2, pp 331-346, issn 0925-1022, 16 p.Article

Provably secure three-party authenticated key agreement protocol using smart cardsHAOMIN YANG; YAOXUE ZHANG; YUEZHI ZHOU et al.Computer networks (1999). 2014, Vol 58, pp 29-38, issn 1389-1286, 10 p.Article

Non-interactive multisignatures in the plain public-key model with efficient verificationHAIFENG QIAN; SHOUHUAI XU.Information processing letters. 2010, Vol 111, Num 2, pp 82-89, issn 0020-0190, 8 p.Article

  • Page / 1