Signcryption

Results: 30



#Item
21Public-key cryptography / Signcryption / Digital signature / Cipher / Pairing-based cryptography / Key / Proxy re-encryption / Boneh/Franklin scheme / Cryptography / ID-based encryption / ID-based cryptography

Pairing-based Cryptography: Identity Based Encryption and Beyond

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:22:20
22Optimal asymmetric encryption padding / RSA / Padding / Block cipher / Cipher / Random oracle / Cryptography / Public-key cryptography / Signcryption

Optimal Signcryption from Any Trapdoor Permutation Yevgeniy Dodis† Michael J. Freedman† Stanislaw Jarecki‡

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 20:05:14
23Digital signature / Key / Cryptographic hash function / Probabilistic encryption / Message authentication code / Symmetric-key algorithm / RSA / ID-based encryption / Signcryption / Cryptography / Key management / Public-key cryptography

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-12-20 13:03:42
24ElGamal encryption / Digital signature / RSA / Schnorr signature / XTR / Yuliang Zheng / Key / Index of cryptography articles / ElGamal signature scheme / Cryptography / Public-key cryptography / Signcryption

PDF Document

Add to Reading List

Source URL: www.signcryption.org

Language: English - Date: 2013-03-05 21:37:01
25Signcryption / Elliptic curve cryptography / Elliptic curve / ElGamal signature scheme / IEEE P1363 / ElGamal encryption / Digital signature / Index of cryptography articles / Homomorphic signatures for network coding / Cryptography / Public-key cryptography / Finite fields

PDF Document

Add to Reading List

Source URL: www.signcryption.org

Language: English - Date: 2013-03-05 21:36:41
26Digital signature / Perfect forward secrecy / Public key infrastructure / Key / RSA / Signcryption / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Key management

PDF Document

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2005-05-17 17:24:40
27Cryptographic protocols / Internet protocols / Signcryption / Online Certificate Status Protocol / X.509 / Elliptic curve cryptography / Revocation list / Public key infrastructure / Public key certificate / Cryptography / Public-key cryptography / Key management

PDF Document

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-03-19 20:00:26
28Public-key cryptography / IEEE P1363 / ID-based encryption / IEEE Standards Association / Pairing / Proxy re-encryption / Institute of Electrical and Electronics Engineers / Cryptographic primitive / Signcryption / Cryptography / IEEE standards / Standards organizations

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-05-13 13:20:44
29Cryptographic protocols / Internet protocols / Online Certificate Status Protocol / X.509 / Signcryption / Elliptic curve cryptography / Pretty Good Privacy / S/MIME / Man-in-the-middle attack / Cryptography / Public-key cryptography / Internet standards

PDF Document

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-03-19 20:00:30
30Cryptography / Public-key cryptography / Signcryption

PDF Document

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-03-20 20:00:41
UPDATE