Certificateless cryptography

Results: 10



#Item
1Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-30 11:15:58
2Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang, Dengguo Feng, State Key Laboratory of Information Security Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhan

Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang, Dengguo Feng, State Key Laboratory of Information Security Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhan

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-30 05:02:16
3Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol Qingfeng Cheng Luoyang University of Foreign Languages, Luoyang, PR China

Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol Qingfeng Cheng Luoyang University of Foreign Languages, Luoyang, PR China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-28 03:05:00
4Using Sphinx to Improve Onion Routing Circuit Construction∗ Aniket Kate and Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo, ON, Canada {akate,iang}@cs.uwaterloo.ca Abstract

Using Sphinx to Improve Onion Routing Circuit Construction∗ Aniket Kate and Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo, ON, Canada {akate,iang}@cs.uwaterloo.ca Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-19 14:07:01
5On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhang@

On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhang@

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 04:27:14
6Efficient Certificateless Signatures Suitable for Aggregation Rafael Castro∗ Ricardo Dahab

Efficient Certificateless Signatures Suitable for Aggregation Rafael Castro∗ Ricardo Dahab

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-06 13:51:07
7Microsoft Word - Efficient and provably-secure certificateless signature scheme without bilinear pairings.doc

Microsoft Word - Efficient and provably-secure certificateless signature scheme without bilinear pairings.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-27 09:37:29
8Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]

Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
9

PDF Document

Add to Reading List

Source URL: crpit.com

Language: English - Date: 2012-01-19 01:27:31
10

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-10-21 08:21:48