David Galindo

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Robust subgroup multi-signatures for consensus
 
2022-07-06Paper
Extended security arguments for signature schemes
Designs, Codes and Cryptography
2016-02-19Paper
A practical leakage-resilient signature scheme in the generic group model
Selected Areas in Cryptography
2015-12-04Paper
Compact hierarchical identity-based encryption based on a Harder decisional problem
International Journal of Computer Mathematics
2015-06-24Paper
Limits of a conjecture on a leakage-resilient cryptosystem
Information Processing Letters
2014-04-15Paper
A note on an IND-CCA2 secure paillier-based cryptosystem
Information Processing Letters
2014-04-14Paper
A leakage-resilient pairing-based variant of the Schnorr signature scheme
Cryptography and Coding
2014-01-17Paper
Identity-based encryption with master key-dependent message security and leakage-resilience
Computer Security – ESORICS 2012
2013-10-23Paper
Extended security arguments for signature schemes
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
On the generic construction of identity-based signatures with additional properties
Advances in Mathematics of Communications
2011-06-03Paper
Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
Lecture Notes in Computer Science
2010-11-26Paper
On the security of public key cryptosystems with a double decryption mechanism
Information Processing Letters
2010-06-09Paper
Public-key encryption with non-interactive opening: new constructions and stronger definitions
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Easy verifiable primitives and practical public key cryptosystems
Lecture Notes in Computer Science
2010-02-09Paper
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
Theoretical Computer Science
2009-11-06Paper
A Schnorr-Like Lightweight Identity-Based Signature Scheme
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
Cryptology and Network Security
2009-01-09Paper
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles
Lecture Notes in Computer Science
2008-11-27Paper
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework)
Lecture Notes in Computer Science
2008-11-20Paper
Relations Among Notions of Security for Identity Based Encryption Schemes
LATIN 2006: Theoretical Informatics
2008-09-18Paper
A Generic Construction for Token-Controlled Public Key Encryption
Financial Cryptography and Data Security
2008-09-09Paper
On the Generic Construction of Identity-Based Signatures with Additional Properties
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
Information Security and Privacy
2007-09-07Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes
Public Key Cryptography — PKC 2003
2003-07-27Paper


Research outcomes over time


This page was built for person: David Galindo