Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Zero-knowledge undeniable signatures (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Mathematics of Computation
Function field sieve method for discrete logarithms over finite fields
Information and Computation
The Relationship Between Breaking the Diffie--Hellman Protocol and Computing Discrete Logarithms
SIAM Journal on Computing
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Toward Hierarchical Identity-Based Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Self-Blindable Credential Certificates from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Supersingular Curves in Cryptography
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Efficient and Secure Conference-Key Distribution
Proceedings of the International Workshop on Security Protocols
An Identity Based Encryption Scheme Based on Quadratic Residues
Proceedings of the 8th IMA International Conference on Cryptography and Coding
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
The Function Field Sieve Is Quite Special
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Off-line Electronic Cash System Based On The Representation Problem.
An Efficient Off-line Electronic Cash System Based On The Representation Problem.
Non-interactive public-key cryptography
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
IEEE Transactions on Information Theory
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
The dual receiver cryptosystem and its applications
Proceedings of the 11th ACM conference on Computer and communications security
Research on authenticated key agreement in group settings
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Transformation-free proxy cryptosystems and their applications to electronic commerce
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A secure and scalable group key exchange system
Information Processing Letters
Secure acknowledgment aggregation and multisignatures with limited robustness
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web dynamics
Implementation of cryptosystems based on Tate pairing
Journal of Computer Science and Technology
Establishment of Ad-Hoc Communities through Policy-Based Cryptography
Electronic Notes in Theoretical Computer Science (ENTCS)
All-in-one group-oriented cryptosystem based on bilinear pairing
Information Sciences: an International Journal
One-Round ID-Based Blind Signature Scheme without ROS Assumption
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
An efficient protocol for private and accurate mining of support counts
Pattern Recognition Letters
New left-to-right minimal weight signed-digit radix-r representation
Computers and Electrical Engineering
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
The Diffie---Hellman problem and generalization of Verheul's theorem
Designs, Codes and Cryptography
Trace and revoke systems with short ciphertexts
Proceedings of the 2nd international conference on Security of information and networks
A secure and scalable Group Key Exchange system
Information Processing Letters
Journal of Systems and Software
A novel verifiably encrypted signature scheme without random oracle
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Secure signed radix-r recoding methods for constrained-embedded devices
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Efficient computations of the Tate pairing for the large MOV degrees
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Two efficient and provably secure schemes for server-assisted threshold signatures
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Distributed private-key generators for identity-based cryptography
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Identity-based chameleon hash scheme without key exposure
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Deterministic encoding and hashing to odd hyperelliptic curves
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Local duality and the discrete logarithm problem
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
Efficient pairing computation on Elliptic curves in Hessian form
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Collusion-Free policy-based encryption
ISC'06 Proceedings of the 9th international conference on Information Security
A new signature scheme without random oracles from bilinear pairings
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
ID-Based proxy signature using bilinear pairings
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature)
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
ID-Based series-parallel multisignature schemes for multi-messages from bilinear maps
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Policy-based cryptography and applications
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
ID-Based aggregate signatures from bilinear pairings
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Efficient identity-based signatures and blind signatures
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
A remark on implementing the weil pairing
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A robust multisignature scheme with applications to acknowledgement aggregation
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Public key encryption with conjunctive field keyword search
WISA'04 Proceedings of the 5th international conference on Information Security Applications
A ring signature scheme using bilinear pairings
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Timed-release encryption with pre-open capability and its application to certified e-mail system
ISC'05 Proceedings of the 8th international conference on Information Security
Secure obfuscation for encrypted signatures
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
Closed formulae for the Weil pairing inversion
Finite Fields and Their Applications
Improved anonymous timed-release encryption
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Public key encryption with conjunctive keyword search and its extension to a multi-user system
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Security and Communication Networks
Identity-based chameleon hashing and signatures without key exposure
Information Sciences: an International Journal
Hi-index | 0.01 |