On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes
暂无分享,去创建一个
[1] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[2] Shai Halevi,et al. A Tweakable Enciphering Mode , 2003, CRYPTO.
[3] Stanislaw Jarecki,et al. Public Key Cryptography – PKC 2009 , 2009, Lecture Notes in Computer Science.
[4] David Pointcheval,et al. The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes , 2001, Public Key Cryptography.
[5] Mihir Bellare,et al. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES , 2001, CT-RSA.
[6] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[7] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[8] Nigel P. Smart,et al. Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings , 2008, EUROCRYPT.
[9] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[10] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[11] Joonsang Baek,et al. Realizing Stateful Public Key Encryption in Wireless Sensor Network , 2008, SEC.
[12] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, Journal of Cryptology.
[13] David Naccache,et al. Topics in Cryptology — CT-RSA 2001 , 2001, Lecture Notes in Computer Science.
[14] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[15] Eike Kiltz,et al. Compact CCA-Secure Encryption for Messages of Arbitrary Length , 2009, Public Key Cryptography.
[16] Xavier Boyen,et al. A tapestry of identity-based encryption: practical frameworks compared , 2008, Int. J. Appl. Cryptogr..
[17] Kaoru Kurosawa,et al. How to Remove MAC from DHIES , 2004, ACISP.
[18] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[19] Michael Scott,et al. On the application of pairing based cryptography to wireless sensor networks , 2009, WiSec '09.
[20] Kaoru Kurosawa,et al. Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings , 2007, International Conference on the Theory and Application of Cryptology and Information Security.
[21] Mihir Bellare,et al. Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation , 2006, CCS '06.
[22] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[23] David Cash,et al. The Twin Diffie-Hellman Problem and Applications , 2008, EUROCRYPT.
[24] Xavier Boyen. Miniature CCA2 PK Encryption: Tight Security Without Redundancy , 2007, ASIACRYPT.
[25] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[26] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[27] Le Trieu Phong,et al. Stateful identity-based encryption scheme: faster encryption and decryption , 2008, ASIACCS '08.
[28] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, CRYPTO.
[29] Joonsang Baek,et al. Generic Constructions of Stateful Public Key Encryption and Their Applications , 2008, ACNS.
[30] Bodo Möller. Algorithms for Multi-exponentiation , 2001, Selected Areas in Cryptography.
[31] Masaaki Shirase,et al. Efficient Implementation of Pairing-Based Cryptography on a Sensor Node , 2009, IEICE Trans. Inf. Syst..
[32] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[33] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .