David Galindo

From MaRDI portal
(Redirected from Person:247142)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Robust subgroup multi-signatures for consensus2022-07-06Paper
Extended security arguments for signature schemes
Designs, Codes and Cryptography
2016-02-19Paper
A practical leakage-resilient signature scheme in the generic group model
Selected Areas in Cryptography
2015-12-04Paper
Compact hierarchical identity-based encryption based on a Harder decisional problem
International Journal of Computer Mathematics
2015-06-24Paper
Limits of a conjecture on a leakage-resilient cryptosystem
Information Processing Letters
2014-04-15Paper
A note on an IND-CCA2 secure paillier-based cryptosystem
Information Processing Letters
2014-04-14Paper
A leakage-resilient pairing-based variant of the Schnorr signature scheme
Cryptography and Coding
2014-01-17Paper
Identity-based encryption with master key-dependent message security and leakage-resilience
Computer Security – ESORICS 2012
2013-10-23Paper
Extended security arguments for signature schemes
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
On the generic construction of identity-based signatures with additional properties
Advances in Mathematics of Communications
2011-06-03Paper
Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
Lecture Notes in Computer Science
2010-11-26Paper
On the security of public key cryptosystems with a double decryption mechanism
Information Processing Letters
2010-06-09Paper
Public-key encryption with non-interactive opening: new constructions and stronger definitions
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Easy verifiable primitives and practical public key cryptosystems
Lecture Notes in Computer Science
2010-02-09Paper
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
Theoretical Computer Science
2009-11-06Paper
A Schnorr-Like Lightweight Identity-Based Signature Scheme
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
Cryptology and Network Security
2009-01-09Paper
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles
Lecture Notes in Computer Science
2008-11-27Paper
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework)
Lecture Notes in Computer Science
2008-11-20Paper
Relations Among Notions of Security for Identity Based Encryption Schemes
LATIN 2006: Theoretical Informatics
2008-09-18Paper
A Generic Construction for Token-Controlled Public Key Encryption
Financial Cryptography and Data Security
2008-09-09Paper
On the Generic Construction of Identity-Based Signatures with Additional Properties
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
Information Security and Privacy
2007-09-07Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes
Public Key Cryptography — PKC 2003
2003-07-27Paper


Research outcomes over time


This page was built for person: David Galindo