Signcryption

Results: 30



#Item
1Cryptography / Public-key cryptography / Signcryption / Cryptographic primitive / Ciphertext indistinguishability / Key

Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
2

Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps Paulo S. L. M. Barreto2 , Benoˆıt Libert3⋆ , Noel McCullagh1⋆⋆ , and Jean-Jacques Quisquater3 1

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2006-04-13 07:56:46
    3

    Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 , and Willy Susilo1, 1

    Add to Reading List

    Source URL: manulis.eu

    Language: English - Date: 2013-12-30 10:26:25
      4Cryptography / Public-key cryptography / Signcryption / Authenticated encryption / Cryptographic protocol / Secure channel / Key authentication / Serge Vaudenay / Encryption / Block cipher / Draft:C. Pandu Rangan / Index of cryptography articles

      - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

      Add to Reading List

      Source URL: security-lab.jaist.ac.jp

      Language: English - Date: 2015-11-09 21:16:55
      5

      Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad1 and Alexander W. Dent2 1 The Selmer Center, Department of Informatics,

      Add to Reading List

      Source URL: www.ii.uib.no

      Language: English - Date: 2006-05-09 09:19:27
        6

        Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad1 and Alexander W. Dent2 1 The Selmer Center, Department of Informatics,

        Add to Reading List

        Source URL: www.ii.uib.no

        Language: English - Date: 2006-05-09 09:19:40
          7ID-based encryption / RSA / Digital signature / Standard model / Encryption / Cryptography / Public-key cryptography / Signcryption

          Public-Key Cryptography with Joint and Related-Key Security Susan Thomson Thesis submitted to the University of London for the degree of Doctor of Philosophy

          Add to Reading List

          Source URL: www.isg.rhul.ac.uk

          Language: English - Date: 2014-10-10 11:06:02
          8Optimal asymmetric encryption padding / Chosen-ciphertext attack / Chosen-plaintext attack / Signcryption / Cipher / Symmetric-key algorithm / RSA / Probabilistic encryption / Semantic security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

          Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2003-12-17 04:10:40
          9Security / Applied mathematics / Signcryption / Digital signature / Cipher / Elliptic curve cryptography / ID-based encryption / Cryptography / Public-key cryptography / Cyberwarfare

          1 Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks Attila Altay Yavuz and Peng Ning

          Add to Reading List

          Source URL: discovery.csc.ncsu.edu

          Language: English - Date: 2011-11-09 13:26:12
          10Electronic commerce / Internet privacy / Signcryption / Encryption / Cipher / Secure communication / National Security Agency / Key generation / Secure multi-party computation / Cryptography / Public-key cryptography / Cryptographic protocols

          SECURITY INTELLIGENCE for BROADCAST: THREAT ANALYTICS Sumit Chakraborty Fellow, Indian Institute of Management Calcutta, BEE (Jadavpur University), India E-mail: , ; Phon

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-04-18 09:37:56
          UPDATE