1![Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with](https://www.pdfsearch.io/img/f62a6ddf495e68930c2a90995877ee74.jpg) | Add to Reading ListSource URL: security-lab.jaist.ac.jpLanguage: English - Date: 2015-11-22 02:25:24
|
---|
2![Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps Paulo S. L. M. Barreto2 , Benoˆıt Libert3⋆ , Noel McCullagh1⋆⋆ , and Jean-Jacques Quisquater3 1 Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps Paulo S. L. M. Barreto2 , Benoˆıt Libert3⋆ , Noel McCullagh1⋆⋆ , and Jean-Jacques Quisquater3 1](https://www.pdfsearch.io/img/d7d3d98aed8cdcb48cbeed5aaa5e75a2.jpg) | Add to Reading ListSource URL: perso.uclouvain.beLanguage: English - Date: 2006-04-13 07:56:46
|
---|
3![Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 , and Willy Susilo1, 1 Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 , and Willy Susilo1, 1](https://www.pdfsearch.io/img/2fee5cbf0eb68448c58370ae5fb8eba5.jpg) | Add to Reading ListSource URL: manulis.euLanguage: English - Date: 2013-12-30 10:26:25
|
---|
4![- Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua. - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.](https://www.pdfsearch.io/img/5ee12255aa948f824f3eff7993f3c1e3.jpg) | Add to Reading ListSource URL: security-lab.jaist.ac.jpLanguage: English - Date: 2015-11-09 21:16:55
|
---|
5![Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad1 and Alexander W. Dent2 1 The Selmer Center, Department of Informatics, Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad1 and Alexander W. Dent2 1 The Selmer Center, Department of Informatics,](https://www.pdfsearch.io/img/4ffd697f29fe00199c13feff50dd6334.jpg) | Add to Reading ListSource URL: www.ii.uib.noLanguage: English - Date: 2006-05-09 09:19:27
|
---|
6![Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad1 and Alexander W. Dent2 1 The Selmer Center, Department of Informatics, Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad1 and Alexander W. Dent2 1 The Selmer Center, Department of Informatics,](https://www.pdfsearch.io/img/884eeb87334296d47f6b6bbe1b330471.jpg) | Add to Reading ListSource URL: www.ii.uib.noLanguage: English - Date: 2006-05-09 09:19:40
|
---|
7![Public-Key Cryptography with Joint and Related-Key Security Susan Thomson Thesis submitted to the University of London for the degree of Doctor of Philosophy Public-Key Cryptography with Joint and Related-Key Security Susan Thomson Thesis submitted to the University of London for the degree of Doctor of Philosophy](https://www.pdfsearch.io/img/eaedfc7d885de97c147e8d2bc8bfb24b.jpg) | Add to Reading ListSource URL: www.isg.rhul.ac.ukLanguage: English - Date: 2014-10-10 11:06:02
|
---|
8![Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg](https://www.pdfsearch.io/img/d23d106cb9a902698f2e62d59015a255.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2003-12-17 04:10:40
|
---|
9![1 Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks Attila Altay Yavuz and Peng Ning 1 Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks Attila Altay Yavuz and Peng Ning](https://www.pdfsearch.io/img/c87ac5efaacb784172d7f9d2b76d78f4.jpg) | Add to Reading ListSource URL: discovery.csc.ncsu.eduLanguage: English - Date: 2011-11-09 13:26:12
|
---|
10![SECURITY INTELLIGENCE for BROADCAST: THREAT ANALYTICS Sumit Chakraborty Fellow, Indian Institute of Management Calcutta, BEE (Jadavpur University), India E-mail: , ; Phon SECURITY INTELLIGENCE for BROADCAST: THREAT ANALYTICS Sumit Chakraborty Fellow, Indian Institute of Management Calcutta, BEE (Jadavpur University), India E-mail: , ; Phon](https://www.pdfsearch.io/img/469a1cac9d89098936e3957ffeb94fa8.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-18 09:37:56
|
---|