Publication | Date of Publication | Type |
---|
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles | 2022-10-28 | Paper |
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC | 2022-10-14 | Paper |
Blockchain-based efficient public integrity auditing for cloud storage against malicious auditors | 2021-12-08 | Paper |
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN | 2021-09-06 | Paper |
Attribute-based proxy re-encryption from standard lattices | 2021-04-08 | Paper |
Functional broadcast encryption with applications to data sharing for cloud storage | 2021-02-04 | Paper |
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme | 2020-10-07 | Paper |
Access control encryption with efficient verifiable sanitized decryption | 2020-09-22 | Paper |
Insight of the protection for data security under selective opening attacks | 2020-07-02 | Paper |
A new identification algorithm | 2019-10-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q5194165 | 2019-09-20 | Paper |
Revocable identity-based encryption from the computational Diffie-Hellman problem | 2018-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q3180409 | 2017-01-06 | Paper |
Attribute-based key-insulated signature and its applications | 2016-07-11 | Paper |
Non-malleability Under Selective Opening Attacks: Implication and Separation | 2016-03-10 | Paper |
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext | 2015-11-20 | Paper |
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited | 2015-10-16 | Paper |
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security | 2015-08-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q5500918 | 2015-08-10 | Paper |
Optimal assignment schemes for general access structures based on linear programming | 2015-03-12 | Paper |
An efficient threshold key-insulated signature scheme | 2014-03-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4917450 | 2013-04-30 | Paper |
Annihilators of Fast Discrete Fourier Spectra Attacks | 2013-04-04 | Paper |
A Generic Construction of Accountable Decryption and Its Applications | 2012-09-07 | Paper |
Accountable authority key policy attribute-based encryption | 2012-08-17 | Paper |
Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator | 2012-07-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q2888068 | 2012-05-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q3100670 | 2011-11-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q3170753 | 2011-09-29 | Paper |
Self-generated-certificate public key encryption without pairing and its application | 2011-06-22 | Paper |
Key updating technique in identity-based encryption | 2011-06-22 | Paper |
Lightweight Delegated Subset Test with Privacy Protection | 2011-05-19 | Paper |
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings | 2011-01-28 | Paper |
Some remarks on the TKIP key mixing function of IEEE 802.11i | 2011-01-05 | Paper |
Distributed certificateless key encapsulation mechanism secure against the adaptive adversary | 2011-01-05 | Paper |
A universal composability framework for analysis of proxy threshold signature | 2011-01-05 | Paper |
Formal analysis of authentication in 802.11i | 2011-01-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q3053460 | 2010-10-29 | Paper |
Building representative-based data aggregation tree in wireless sensor networks | 2010-04-23 | Paper |
Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism | 2010-03-11 | Paper |
Identity-Based Strong Key-Insulated Signature Without Random Oracles | 2010-02-12 | Paper |
A tabu search approach for the minimum sum-of-squares clustering problem | 2009-10-30 | Paper |
Democratic group signatures with collective traceability | 2009-10-15 | Paper |
Filling the gap between voters and cryptography in e-voting | 2009-06-30 | Paper |
A synthetic indifferentiability analysis of some block-cipher-based hash functions | 2009-03-31 | Paper |
https://portal.mardi4nfdi.de/entity/Q3610983 | 2009-03-06 | Paper |
A Tamper-Evident Voting Machine Resistant to Covert Channels | 2009-01-27 | Paper |
Identity-Based Key-Insulated Signature with Secure Key-Updates | 2009-01-15 | Paper |
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings | 2009-01-09 | Paper |
Some New Characters on the Wire-Tap Channel of Type II | 2008-12-21 | Paper |
Identity-Based Threshold Key-Insulated Encryption without Random Oracles | 2008-04-24 | Paper |
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction | 2008-04-11 | Paper |
Certificateless threshold cryptosystem secure against chosen-ciphertext attack | 2008-01-03 | Paper |
Pirate decoder for the broadcast encryption schemes from Crypto 2005 | 2007-10-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q5307855 | 2007-09-18 | Paper |
Efficient Partially Blind Signature Scheme with Provable Security | 2007-09-10 | Paper |
ID-based threshold decryption secure against adaptive chosen-ciphertext attack | 2007-06-08 | Paper |
Trust based pervasive computing | 2007-06-01 | Paper |
A generic solution to realize public verifiability of signcryption | 2007-06-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3431080 | 2007-04-05 | Paper |
On the orders of transformation matrices (mod \(n\)) and two types of generalized Arnold transformation matrices | 2007-02-20 | Paper |
Optimistic fair exchange e-commerce protocol based on secret sharing | 2007-02-14 | Paper |
ID-based threshold decryption secure against chosen plaintext attack | 2006-11-15 | Paper |
Buffer overflow detection on binary code | 2006-11-15 | Paper |
Verifiable encrypted signatures without random oracles | 2006-11-15 | Paper |
How to play E-lottery games via voting | 2006-11-15 | Paper |
Cryptology and Network Security | 2006-11-14 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Information Security | 2006-10-20 | Paper |
A provably secure asynchronous proactive RSA scheme | 2006-10-04 | Paper |
A dynamic threshold commercial key escrow scheme based on conic | 2006-05-18 | Paper |
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings | 2005-11-16 | Paper |
Identity oriented signature scheme based on quadratic residues | 2005-11-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q5700981 | 2005-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q5700987 | 2005-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q5700995 | 2005-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q5700998 | 2005-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q5700999 | 2005-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q5701000 | 2005-11-02 | Paper |
Multiparty authentication services and key agreement protocols with semi-trusted third party. | 2004-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450742 | 2004-02-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4408433 | 2003-06-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4708674 | 2003-06-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4339649 | 1997-12-15 | Paper |
On the Non - Existence of Perfect Codes with Rank Distance | 1996-11-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4846429 | 1995-08-23 | Paper |