default search action
ProvSec 2008: Shanghai, China
- Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai:
Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings. Lecture Notes in Computer Science 5324, Springer 2008, ISBN 978-3-540-88732-4
Encryption
- Huawei Huang, Bo Yang, Shenglin Zhu, Guozhen Xiao:
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. 1-21 - Atsushi Mitsuda, Tetsu Iwata:
Tweakable Pseudorandom Permutation from Generalized Feistel Structure. 22-37 - Sherman S. M. Chow, Siu-Ming Yiu:
Timed-Release Encryption Revisited. 38-51 - S. Sharmila Deva Selvi, S. Sree Vivek, Deepanshu Shukla, C. Pandu Rangan:
Efficient and Provably Secure Certificateless Multi-receiver Signcryption. 52-67 - Yvo Desmedt, Duong Hieu Phan:
A CCA Secure Hybrid Damgård's ElGamal Encryption. 68-82
Signature
- Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. 83-97 - Fuchun Guo, Yi Mu:
Optimal Online/Offline Signature: How to Sign a Message without Online Computation. 98-111 - Kristian Gjøsteen, Lillian Kråkmo:
Round-Optimal Blind Signatures from Waters Signatures. 112-126 - Zhenhua Liu, Yupu Hu, Hua Ma:
Secure Proxy Multi-signature Scheme in the Standard Model. 127-140 - Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Server-Aided Verification Signatures: Definitions and New Constructions. 141-155
Analysis
- Liqun Chen, Paul Morrissey, Nigel P. Smart:
On Proofs of Security for DAA Schemes. 156-175 - Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. 176-184 - Zhengqin Luo:
Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups. 185-199 - Tibor Jager, Jörg Schwenk:
On the Equivalence of Generic Group Models. 200-209 - Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang:
The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. 210-225
Application of Hash Functions
- Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta:
Leaky Random Oracle (Extended Abstract). 226-240 - Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, Pascal Paillier, Thomas Peyrin:
How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions. 241-253 - Ahto Buldas, Margus Niitsoo:
Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?. 254-267
Universal Composability
- Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
Relationship of Three Cryptographic Channels in the UC Framework. 268-282 - Sebastian Gajek:
A Universally Composable Framework for the Analysis of Browser-Based Security Protocols. 283-297 - Peeter Laud, Long Ngo:
Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library. 298-312 - Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk:
Universally Composable Security Analysis of TLS. 313-327 - Huafei Zhu:
Round Optimal Universally Composable Oblivious Transfer Protocols. 328-334
Applications
- Wei Han, Tao Hao, Dong Zheng, Kefei Chen, Xiaofeng Chen:
A Tamper-Evident Voting Machine Resistant to Covert Channels. 335-344 - Wei Du, Mingxing He:
Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. 345-359
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.