The following pages link to David Galindo (Q247142):
Displaying 28 items.
- On the generic construction of identity-based signatures with additional properties (Q540392) (← links)
- On the security of public key cryptosystems with a double decryption mechanism (Q975470) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- Robust subgroup multi-signatures for consensus (Q2152179) (← links)
- A note on an IND-CCA2 secure paillier-based cryptosystem (Q2445334) (← links)
- Limits of a conjecture on a leakage-resilient cryptosystem (Q2445905) (← links)
- Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience (Q2856097) (← links)
- A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme (Q2870093) (← links)
- Extended Security Arguments for Signature Schemes (Q2900604) (← links)
- Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman (Q3059663) (← links)
- Easy Verifiable Primitives and Practical Public Key Cryptosystems (Q3404394) (← links)
- A Practical Leakage-Resilient Signature Scheme in the Generic Group Model (Q3455486) (← links)
- A Generic Construction for Token-Controlled Public Key Encryption (Q3524136) (← links)
- Relations Among Notions of Security for Identity Based Encryption Schemes (Q3525754) (← links)
- Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework) (Q3540057) (← links)
- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles (Q3541886) (← links)
- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions (Q3558321) (← links)
- A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption (Q3600103) (← links)
- Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening (Q3623060) (← links)
- A Schnorr-Like Lightweight Identity-Based Signature Scheme (Q3637136) (← links)
- A Practical Public Key Cryptosystem from Paillier and Rabin Schemes (Q4414716) (← links)
- Compact hierarchical identity-based encryption based on a harder decisional problem (Q5259051) (← links)
- On the Generic Construction of Identity-Based Signatures with Additional Properties (Q5459078) (← links)
- A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks (Q5502757) (← links)
- Progress in Cryptology - INDOCRYPT 2004 (Q5712192) (← links)
- Automata, Languages and Programming (Q5716828) (← links)
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles (Q5757717) (← links)
- Extended security arguments for signature schemes (Q5963366) (← links)