Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference34 articles.
1. Abe, M., Gennaro, R., Karosawa, K., Shoup, V.: Tag-KEM/DEM: A new framework for hybrid encryption. In: Cramer, R. (ed.) Advance in Cryptology – Eurocrypt 2005. Lecture Notes in Computer Science, vol. 3494, pp. 128–146. Springer, Heidelberg (2005)
2. Al-Riyami, S.: Cryptographic schemes based on elliptic curve pairings. Ph.D. thesis, Royal Holloway, University of London (2004). http://www.isg.rhul.ac.uk/~kp/sattthesis.pdf
3. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.S. (ed.) Advances in Cryptology—Asiacrypt 2003. Lecture Notes in Computer Science, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)
4. Al-Riyami, S.S., Paterson, K.G.: CBE from CL-PKE: A generic construction and efficient schemes. In: Vaudenay, S. (ed.) Public Key Cryptography—PKC 2005. Lecture Notes in Computer Science, vol. 3386, pp. 398–415. Springer, Heiedelberg (2005)
5. Au, M.H., Chen, J., Liu, J.K., Mu, Y., Wong, D.S., Yang, G.: Malicious KGC attack in certificateless cryptography. In: Proceedings pf ACM Symposium on Information, Computer and Communications Security. ACM Press, New York (2007)
Cited by
84 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献