Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Invited Paper
Password-Based Authenticated Key Exchange: An Overview
Practical and Provably Secure Attribute Based Encryption
Fundamental
Adaptive versus Static Security in the UC Model
Impossibility of Surjective Icart-Like Encodings
Symmetric Key Encryption
On the practical security bound of GF-NLFSR structure with SPN round function
Misuse-Resistant Variants of the OMD Authenticated Encryption Mode
A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function
Authentication.-Forward-Secure Sequential Aggregate Message Authentication Revisited: Formalization and a Provably Secure Scheme
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags
Signatures
Generic Transformation to Strongly Existentially Unforgettable Signature Schemes with Leakage Resiliency
Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures
Protocol
Verifiable Computation in Multiparty Protocols with Honest Majority
Public Key Encryption
Lossy Trapdoor Relation and Its Application to Lossy Encryption and Adaptive Trapdoor Relation.-Compact Public Key Encryption with Minimum Ideal Property of Hash Functions
Proxy Re-Encryption
RCCA-Secure Multi-use Bidirectional Proxy Re-Encryption with Master Secret Security
Fine-grained Conditional Proxy Re-encryption and Application
Predicate Encryption
Constructing Subspace Membership Encryption through Inner Product Encryption
Efficient (Anonymous) Compact HIBE From Standard Assumptions
Attribute-based Cryptosystem
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
Attribute-Based Signcryption : Signer Privacy, Strong Unforgetability and IND-CCA2 Security in Adaptive-Predicates Attack
Short Papers
How to Use Pseudorandom Generators in Unconditional Security Settings
Equivalence between MAC and PRF for Blockcipher based Constructions
A Short Fail-Stop Signature Scheme from Factoring
Computational Soundness of Asymmetric Bilinear Pairing-based Protocols
Timed-Release Computational Secret Sharing Scheme and Its Applications
Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage
Complete Robustness in Identity-Based Encryption.

Browse Subjects

Show more subjects...

Statistics

from
to
Export