Signcryption

Results: 30



#Item
21Pairing-based Cryptography:  Identity Based Encryption and Beyond

Pairing-based Cryptography: Identity Based Encryption and Beyond

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:22:20
22Optimal Signcryption from Any Trapdoor Permutation Yevgeniy Dodis† Michael J. Freedman†  Stanislaw Jarecki‡

Optimal Signcryption from Any Trapdoor Permutation Yevgeniy Dodis† Michael J. Freedman† Stanislaw Jarecki‡

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 20:05:14
23Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-12-20 13:03:42
24

PDF Document

Add to Reading List

Source URL: www.signcryption.org

Language: English - Date: 2013-03-05 21:37:01
25

PDF Document

Add to Reading List

Source URL: www.signcryption.org

Language: English - Date: 2013-03-05 21:36:41
26

PDF Document

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2005-05-17 17:24:40
27

PDF Document

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-03-19 20:00:26
28

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-05-13 13:20:44
29

PDF Document

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-03-19 20:00:30
30

PDF Document

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-03-20 20:00:41