Automata, Languages and Programming
From MaRDI portal
Publication:5716828
DOI10.1007/11523468zbMath1084.94015OpenAlexW2940595899WikidataQ56656999 ScholiaQ56656999MaRDI QIDQ5716828
Publication date: 10 January 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11523468
Related Items
An efficient IBE scheme with tight security reduction in the random oracle model, KCI-resilient anonymous wireless link-layer authentication protocols, Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme, Semi-automated verification of security proofs of quantum cryptographic protocols, New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem, Non-Interactive Key Exchange, New approach to practical leakage-resilient public-key cryptography, On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited, Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time, A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model, Verifiable Security of Boneh-Franklin Identity-Based Encryption, Establishment of Ad-Hoc Communities through Policy-Based Cryptography, Combined schemes for signature and encryption: the public-key and the identity-based setting