<--- Back to Details
First PageDocument Content
ID-based encryption / RSA / Group signature / Asiacrypt / Eurocrypt / Index of cryptography articles / Diffie–Hellman problem / Cryptography / Public-key cryptography / International Cryptology Conference
Date: 2013-09-18 16:03:32
ID-based encryption
RSA
Group signature
Asiacrypt
Eurocrypt
Index of cryptography articles
Diffie–Hellman problem
Cryptography
Public-key cryptography
International Cryptology Conference

Add to Reading List

Source URL: www.cs.ucdavis.edu

Download Document from Source Website

File Size: 37,20 KB

Share Document on Facebook

Similar Documents

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

DocID: 1xVS4 - View Document

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ May 3, 2018—Eurocrypt 2018, Tel Aviv, Israel

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ May 3, 2018—Eurocrypt 2018, Tel Aviv, Israel

DocID: 1xV7Y - View Document

Full version of an extended abstract published in Proceedings of Eurocrypt 2014, Springer-Verlag, 2014. D´ej`a Q: Using Dual Systems to Revisit q-Type Assumptions Sarah Meiklejohn∗ UC San Diego

Full version of an extended abstract published in Proceedings of Eurocrypt 2014, Springer-Verlag, 2014. D´ej`a Q: Using Dual Systems to Revisit q-Type Assumptions Sarah Meiklejohn∗ UC San Diego

DocID: 1xUHi - View Document

Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as ReportMalleable Proof Systems and Applications Melis

Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as ReportMalleable Proof Systems and Applications Melis

DocID: 1xUhb - View Document

PDF Document

DocID: 1xqsq - View Document