Signcryption

Results: 30



#Item
11Public-Key Encryption with Lazy Parties∗ Kenji Yasunaga† April 28, 2015 Abstract In a public-key encryption scheme, if a sender is not concerned about the security of a message

Public-Key Encryption with Lazy Parties∗ Kenji Yasunaga† April 28, 2015 Abstract In a public-key encryption scheme, if a sender is not concerned about the security of a message

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 01:59:26
12Microsoft WordA Secure Scheme for Authenticated Encryprion.doc

Microsoft WordA Secure Scheme for Authenticated Encryprion.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 07:11:04
13One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-22 12:08:05
14Version 0.3  Axantum Strong Software Licensing Svante Seleborg Axantum Software AB [removed]

Version 0.3 Axantum Strong Software Licensing Svante Seleborg Axantum Software AB [removed]

Add to Reading List

Source URL: www.axantum.com

Language: English - Date: 2014-05-04 18:08:46
15Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 and Willy Susilo1? 1  Centre for Computer and Information Security Research

Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 and Willy Susilo1? 1 Centre for Computer and Information Security Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-20 21:27:06
16Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed]

Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-06-24 08:19:14
17A preliminary version of this paper appears in the proceedings of Eurocrypt[removed]This is the full version, which appears as IACR ePrint Archive Record[removed]Key-Versatile Signatures and Applications: RKA, KDM and Jo

A preliminary version of this paper appears in the proceedings of Eurocrypt[removed]This is the full version, which appears as IACR ePrint Archive Record[removed]Key-Versatile Signatures and Applications: RKA, KDM and Jo

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:43
18The most basic requirement is to encrypt FTI during transmission Information systems that receive, process, store, or transmit FTI, must: a. Protect the confidentiality and integrity of transmitted information. b. Imple

The most basic requirement is to encrypt FTI during transmission Information systems that receive, process, store, or transmit FTI, must: a. Protect the confidentiality and integrity of transmitted information. b. Imple

Add to Reading List

Source URL: www.taxadmin.org

Language: English - Date: 2014-10-16 15:56:57
19Universally Composable Secure Group Communication Youliang Tian1,2 and Changgen Peng1,2 1 2

Universally Composable Secure Group Communication Youliang Tian1,2 and Changgen Peng1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-28 03:00:32
20Cryptographic Hash Workshop

Cryptographic Hash Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:29:14