[PDF][PDF] Sequences of games: a tool for taming complexity in security proofs
V Shoup - cryptology eprint archive, 2004 - eprint.iacr.org
Sequences of Games: A Tool for Taming Complexity in Security Proofs Page 1 Sequences of
Games: A Tool for Taming Complexity in Security Proofs ∗ Victor Shoup† January 18, 2006 …
Games: A Tool for Taming Complexity in Security Proofs ∗ Victor Shoup† January 18, 2006 …
Efficient signcryption between TPKC and IDPKC and its multi-receiver construction
YX Sun, H Li - Science China Information Sciences, 2010 - Springer
The primitive signcryption provides authenticity and privacy simultaneously. In this paper, we
present efficient signcryption schemes between the traditional public key cryptosystem …
present efficient signcryption schemes between the traditional public key cryptosystem …
ECGSC: elliptic curve based generalized signcryption
Y Han, X Yang, P Wei, Y Wang, Y Hu - International conference on …, 2006 - Springer
Signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of
signature and encryption. The definition of Generalized Signcryption is proposed in the …
signature and encryption. The definition of Generalized Signcryption is proposed in the …
[PDF][PDF] Randomness in digital cryptography: A survey
Digital cryptography relies greatly on randomness in providing the security requirements
imposed by various information systems. Just as different requirements call for specific …
imposed by various information systems. Just as different requirements call for specific …
On the joint security of encryption and signature, revisited
KG Paterson, JCN Schuldt, M Stam… - … Conference on the Theory …, 2011 - Springer
We revisit the topic of joint security for combined public key schemes, wherein a single
keypair is used for both encryption and signature primitives in a secure manner. While …
keypair is used for both encryption and signature primitives in a secure manner. While …
[PDF][PDF] Pclsc-tkem: a pairing-free certificateless signcryption-tag key encapsulation mechanism for a privacy-preserving IoT.
Certificateless Signcryption Tag Key Encapsulation Mechanism (CLSC-TKEM) is an
effective method for simultaneously providing key encapsulation and a digital signature on …
effective method for simultaneously providing key encapsulation and a digital signature on …
Improved Signcryption from q-Diffie-Hellman Problems
B Libert, JJ Quisquater - International Conference on Security in …, 2004 - Springer
This paper proposes a new public key authenticated encryption (signcryption) scheme
based on the hardness of q-Diffie-Hellman problems in Gap Diffie-Hellman groups. This new …
based on the hardness of q-Diffie-Hellman problems in Gap Diffie-Hellman groups. This new …
Author
AN Author - Proc. 12 th Int. Zeolite Conf, 1998 - HeinOnline
BRIEFS BY AUTHOR BRIEFS CASE NOTES BY AUTHOR CASE NOTES BY TITLE Page 1
Cumulative Index: Vols. 1-10 BRIEFS BY AUTHOR BEASLEY, VICKY L., DEVON W …
Cumulative Index: Vols. 1-10 BRIEFS BY AUTHOR BEASLEY, VICKY L., DEVON W …
[PDF][PDF] Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing
Signcryption is a scheme that provides confidentiality and authentication while kee**
costs low in comparison to independent encryption and message sign ing. Since Zheng [13] …
costs low in comparison to independent encryption and message sign ing. Since Zheng [13] …
On the security of padding-based encryption schemes–or–why we cannot prove OAEP secure in the standard model
E Kiltz, K Pietrzak - Advances in Cryptology-EUROCRYPT 2009: 28th …, 2009 - Springer
We investigate the security of “padding-based” encryption schemes in the standard model.
This class contains all public-key encryption schemes where the encryption algorithm first …
This class contains all public-key encryption schemes where the encryption algorithm first …