David Galindo

From MaRDI portal
Revision as of 14:21, 6 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:247142

Available identifiers

zbMath Open galindo.davidMaRDI QIDQ247142

List of research outcomes





PublicationDate of PublicationType
Robust subgroup multi-signatures for consensus2022-07-06Paper
Extended security arguments for signature schemes2016-02-19Paper
A Practical Leakage-Resilient Signature Scheme in the Generic Group Model2015-12-04Paper
Compact hierarchical identity-based encryption based on a harder decisional problem2015-06-24Paper
Limits of a conjecture on a leakage-resilient cryptosystem2014-04-15Paper
A note on an IND-CCA2 secure paillier-based cryptosystem2014-04-14Paper
A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme2014-01-17Paper
Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience2013-10-23Paper
Extended Security Arguments for Signature Schemes2012-07-23Paper
On the generic construction of identity-based signatures with additional properties2011-06-03Paper
Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman2010-11-26Paper
On the security of public key cryptosystems with a double decryption mechanism2010-06-09Paper
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions2010-05-04Paper
Easy Verifiable Primitives and Practical Public Key Cryptosystems2010-02-09Paper
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles2009-11-06Paper
A Schnorr-Like Lightweight Identity-Based Signature Scheme2009-07-07Paper
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening2009-04-29Paper
A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption2009-02-10Paper
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks2009-01-09Paper
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles2008-11-27Paper
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework)2008-11-20Paper
Relations Among Notions of Security for Identity Based Encryption Schemes2008-09-18Paper
A Generic Construction for Token-Controlled Public Key Encryption2008-09-09Paper
On the Generic Construction of Identity-Based Signatures with Additional Properties2008-04-24Paper
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles2007-09-07Paper
Automata, Languages and Programming2006-01-10Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes2003-07-27Paper

Research outcomes over time

This page was built for person: David Galindo