1![Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands. Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.](https://www.pdfsearch.io/img/625a1e83095c6b3be67d0fbbbf09bf5a.jpg) | Add to Reading ListSource URL: www.dgalindo.esLanguage: English - Date: 2007-11-26 10:35:37
|
---|
2![Introduction Related Works Proposal Hashing Conclusion How to Hash into Elliptic Curves Thomas Icart Introduction Related Works Proposal Hashing Conclusion How to Hash into Elliptic Curves Thomas Icart](https://www.pdfsearch.io/img/1bf2251eac51b65869f1f414245829c1.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2009-10-23 17:02:32
|
---|
3![Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro](https://www.pdfsearch.io/img/120a77ffae5cc5463c212072567bbc5f.jpg) | Add to Reading ListSource URL: www.cypherpunks.caLanguage: English - Date: 2010-12-30 09:39:44
|
---|
4![Verified Indifferentiable Hashing into Elliptic Curves Santiago Zanella B´eguelin1 Gilles Barthe2 , Benjamin Gr´egoire3 , Sylvain Heraud3 and Federico Olmedo2 Verified Indifferentiable Hashing into Elliptic Curves Santiago Zanella B´eguelin1 Gilles Barthe2 , Benjamin Gr´egoire3 , Sylvain Heraud3 and Federico Olmedo2](https://www.pdfsearch.io/img/8a4b1288693cd8f86e7efd4b64bd6094.jpg) | Add to Reading ListSource URL: certicrypt.gforge.inria.frLanguage: English - Date: 2013-06-17 13:32:36
|
---|
5![Verifiable Security of Boneh-Franklin Identity-Based Encryption Federico Olmedo Gilles Barthe Santiago Zanella Béguelin IMDEA Software Institute, Madrid, Spain Verifiable Security of Boneh-Franklin Identity-Based Encryption Federico Olmedo Gilles Barthe Santiago Zanella Béguelin IMDEA Software Institute, Madrid, Spain](https://www.pdfsearch.io/img/9644e507e96761c9c6455876bcb6f1b4.jpg) | Add to Reading ListSource URL: certicrypt.gforge.inria.frLanguage: English - Date: 2013-06-17 13:32:36
|
---|
6![Verifiable Security of Boneh-Franklin Identity-Based Encryption⋆ Gilles Barthe, Federico Olmedo, and Santiago Zanella B´eguelin {Gilles.Barthe,Federico.Olmedo,Santiago.Zanella}@imdea.org IMDEA Software Institute, Madr Verifiable Security of Boneh-Franklin Identity-Based Encryption⋆ Gilles Barthe, Federico Olmedo, and Santiago Zanella B´eguelin {Gilles.Barthe,Federico.Olmedo,Santiago.Zanella}@imdea.org IMDEA Software Institute, Madr](https://www.pdfsearch.io/img/61cc20a80d1fdc572f8effda15cc0fee.jpg) | Add to Reading ListSource URL: software.imdea.orgLanguage: English - Date: 2013-03-13 12:33:24
|
---|
7![Verifiable Security of Boneh-Franklin Identity-Based Encryption⋆ Gilles Barthe, Federico Olmedo, and Santiago Zanella B´eguelin {Gilles.Barthe,Federico.Olmedo,Santiago.Zanella}@imdea.org IMDEA Software Institute, Madr Verifiable Security of Boneh-Franklin Identity-Based Encryption⋆ Gilles Barthe, Federico Olmedo, and Santiago Zanella B´eguelin {Gilles.Barthe,Federico.Olmedo,Santiago.Zanella}@imdea.org IMDEA Software Institute, Madr](https://www.pdfsearch.io/img/36e3adabe1dbecc91599f6126d8e7f1e.jpg) | Add to Reading ListSource URL: certicrypt.gforge.inria.frLanguage: English - Date: 2013-06-17 13:32:36
|
---|
8![Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C](https://www.pdfsearch.io/img/fcf617fb2293ab2746ba4b2c0e8b4579.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2005-12-09 06:49:50
|
---|
9![Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese Information Security Institute Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese Information Security Institute](https://www.pdfsearch.io/img/bdecdb425d07cdbd31b211b0199745e5.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-12-15 20:05:23
|
---|
10![On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi](https://www.pdfsearch.io/img/c3520cbcd198bbd1b9c57627775e2140.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2009-10-12 12:17:42
|
---|