Identity-Based Broadcasting
暂无分享,去创建一个
Yi Mu | Willy Susilo | Yan-Xia Lin | Y. Mu | W. Susilo | Yan-Xia Lin
[1] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[2] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[3] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[4] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[5] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[6] Walter M. Lioen,et al. Factorization of RSA-140 Using the Number Field Sieve , 1999, CRYPTO 1999.
[7] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[8] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[9] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[10] C. Pandu Rangan,et al. Progress in Cryptology — INDOCRYPT 2001 , 2001, Lecture Notes in Computer Science.
[11] Francesco Pappalardi,et al. Review of the book "Elliptic Curves in Cryptography" by I. Blake, G. Seroussi, N. Smart. , 2001 .
[12] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[13] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[14] Jeffrey Shallit,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[15] Tsutomu Matsumoto,et al. A Quick Group Key Distribution Scheme with "Entity Revocation" , 1999, ASIACRYPT.
[16] Eric R. Verheul,et al. Self-Blindable Credential Certificates from the Weil Pairing , 2001, ASIACRYPT.
[17] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[18] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[19] Yi Mu,et al. Robust and Secure Broadcasting , 2001, INDOCRYPT.
[20] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.