Author:
Poettering Bertram,Stebila Douglas
Funder
EPSRC Leadership Fellowship
Australian Technology Network and German Academic Exchange Service Joint Research Co-operation scheme
European Commission ICT Programme
Australian Research Council
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference45 articles.
1. Ateniese, G., de Medeiros, B.: Identity-based chameleon hash and applications. In Juels, A. (ed.) FC 2004, LNCS, vol. 3110, pp. 164–180. Key West, USA, February 9–12. Springer, Heidelberg (2004)
2. Brier, E., Coron, J.-S., Icart, T., Madore, D., Randriam, H., Tibouchi, M.: Efficient indifferentiable hashing into ordinary elliptic curves. In: Cryptology ePrint Archive, Report 2009/340.
http://eprint.iacr.org/2009/340
(2009)
3. Brier, E., Coron, J.-S., Icart, T., Madore, D., Randriam, H., Tibouchi, M.: Efficient indifferentiable hashing into ordinary elliptic curves. In: Rabin, T. (ed.) CRYPTO 2010, LNCS, vol. 6223, pp. 237–254, Santa Barbara, CA, USA, August 15–19. Springer, Heidelberg (2010)
4. Bernstein, D.J.: Proving tight security for Rabin–Williams signatures. In: Smart, N.P. (ed.) EUROCRYPT 2008, LNCS, vol. 4965, pp. 70–87, Istanbul, Turkey, April 13–17. Springer, Heidelberg (2008)
5. Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001, LNCS, vol. 2139, pp. 213–229, Santa Barbara, CA, USA, August 19–23. Springer, Heidelberg (2001)
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献