ID-based Secret-Key Cryptography (1998)

by Marc Joye , Sung-Ming Yen
Venue:ACM SIGOPS Operating Systems Review
Citations:3 - 0 self

Active Bibliography

1 On the Efficiency of Authentication Protocols, Digital Signatures and Their Applications in E-Health: A Top-Down Approach – Kemal Biçakci, Kemal Bıçakcı, Assoc Prof, Dr. Onur Demirörs, Assist Prof Dr, Y. Murat Erten, Prof Dr. Nazife Baykal, Bıçakcı Kemal - 2003
2 A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash – Chun-i Fan, Chin-laung Lei
2 GOST 34.10 - A Brief Overview of Russia's DSA – Markus Michels, David Naccache, Holger Petersen, Gemplus Card International - 1996
Encryption Schemes from Bilinear Maps – Eu-jin Goh - 2007
A Remote User Authentication Scheme using Bilinear Pairings – Sanjeev Kumar, K K Goyal
2 Group Blind Digital Signatures: Theory and Applications – Ronald L. Rivest, Zulfikar Amin Ramzan, Zulfikar Amin Ramzan - 1999
2007 IEEE Asia-Pacific Services Computing Conference ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments – Raylin Tso, Xun Yi, Eiji Okamoto
Infosys Technologies Limited – Ashutosh Saxena, Deepak B. Phatak - 2008
FPGA-oriented Security – Mehrdad Majzoobi, Farinaz Koushanfar, Miodrag Potkonjak
Acceleration of Cryptographic Functions using Graphics Hardware – Owen Harrison, Owen Harrison, Owen Harrison
7 Watermarking Graph Partitioning Solutions – Greg Wolfe , Jennifer L. Wong, Miodrag Potkonjak - 2002
14 Strength of Two Data Encryption Standard Implementations under Timing Attacks – Alejandro Hevia, Marcos Kiwi - 1998
11 SECURITY AND COOPERATION IN WIRELESS NETWORKS -- Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing – Levente Buttyán, Jean-pierre Hubaux - 2007
22 Hardware-based public-key cryptography with public physically unclonable functions,” in Information Hiding – Nathan Beckmann, Miodrag Potkonjak - 2009
1 Design, Analysis and Applications of Cryptographic Techniques – Royal Holloway, Chan Yeob Yeun, Chan Yeob Yeun - 2001
Codes -- The Guide to Secrecy . . . – Richard A. Mollin
12 Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks – Jonathan Katz - 2002
3 Lightweight Failure Detection in Secure Group Communication – Patrick Mcdaniel, Atul Prakash - 2000
2 Secure and Minimal Protocols for Authenticated Key Distribution – Philippe Janson, Gene Tsudik - 1995