Signcryption

Results: 30



#Item
1Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with

Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
2Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps Paulo S. L. M. Barreto2 , Benoˆıt Libert3⋆ , Noel McCullagh1⋆⋆ , and Jean-Jacques Quisquater3 1

Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps Paulo S. L. M. Barreto2 , Benoˆıt Libert3⋆ , Noel McCullagh1⋆⋆ , and Jean-Jacques Quisquater3 1

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2006-04-13 07:56:46
    3Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 , and Willy Susilo1, 1

    Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 , and Willy Susilo1, 1

    Add to Reading List

    Source URL: manulis.eu

    Language: English - Date: 2013-12-30 10:26:25
      4- Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

      - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

      Add to Reading List

      Source URL: security-lab.jaist.ac.jp

      Language: English - Date: 2015-11-09 21:16:55
      5Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad1 and Alexander W. Dent2 1  The Selmer Center, Department of Informatics,

      Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad1 and Alexander W. Dent2 1 The Selmer Center, Department of Informatics,

      Add to Reading List

      Source URL: www.ii.uib.no

      Language: English - Date: 2006-05-09 09:19:27
        6Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad1 and Alexander W. Dent2 1  The Selmer Center, Department of Informatics,

        Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad1 and Alexander W. Dent2 1 The Selmer Center, Department of Informatics,

        Add to Reading List

        Source URL: www.ii.uib.no

        Language: English - Date: 2006-05-09 09:19:40
          7Public-Key Cryptography with Joint and Related-Key Security Susan Thomson Thesis submitted to the University of London for the degree of Doctor of Philosophy

          Public-Key Cryptography with Joint and Related-Key Security Susan Thomson Thesis submitted to the University of London for the degree of Doctor of Philosophy

          Add to Reading List

          Source URL: www.isg.rhul.ac.uk

          Language: English - Date: 2014-10-10 11:06:02
          8Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

          Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2003-12-17 04:10:40
          91  Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks Attila Altay Yavuz and Peng Ning

          1 Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks Attila Altay Yavuz and Peng Ning

          Add to Reading List

          Source URL: discovery.csc.ncsu.edu

          Language: English - Date: 2011-11-09 13:26:12
          10SECURITY INTELLIGENCE for BROADCAST: THREAT ANALYTICS Sumit Chakraborty Fellow, Indian Institute of Management Calcutta, BEE (Jadavpur University), India E-mail: , ; Phon

          SECURITY INTELLIGENCE for BROADCAST: THREAT ANALYTICS Sumit Chakraborty Fellow, Indian Institute of Management Calcutta, BEE (Jadavpur University), India E-mail: , ; Phon

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-04-18 09:37:56