Search the dblp DataBase
Alexander W. Dent :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Alexander W. Dent Hybrid Signcryption Schemes with Insider Security. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:253-266 [Conf ] Alexander W. Dent , Steven D. Galbraith Hidden Pairings and Trapdoor DDH Groups. [Citation Graph (0, 0)][DBLP ] ANTS, 2006, pp:436-451 [Conf ] Alexander W. Dent Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:100-109 [Conf ] Alexander W. Dent The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:289-307 [Conf ] Michel Abdalla , Dario Catalano , Alexander W. Dent , John Malone-Lee , Gregory Neven , Nigel P. Smart Identity-Based Encryption Gone Wild. [Citation Graph (0, 0)][DBLP ] ICALP (2), 2006, pp:300-311 [Conf ] Alexander W. Dent A Designer's Guide to KEMs. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:133-151 [Conf ] Alexander W. Dent , John Malone-Lee The Physically Observable Security of Signature Schemes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:220-232 [Conf ] Alexander W. Dent Hybrid Signcryption Schemes with Outsider Security. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:203-217 [Conf ] Tor E. Bjørstad , Alexander W. Dent Building Better Signcryption Schemes with Tag-KEMs. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:491-507 [Conf ] James Birkett , Alexander W. Dent , Gregory Neven , Jacob C. N. Schuldt Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:274-292 [Conf ] Alexander W. Dent , Qiang Tang Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. [Citation Graph (0, 0)][DBLP ] ISC, 2007, pp:158-174 [Conf ] Michel Abdalla , Alexander W. Dent , John Malone-Lee , Gregory Neven , Duong Hieu Phan , Nigel P. Smart Identity-Based Traitor Tracing. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:361-376 [Conf ] Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. [Citation Graph (, )][DBLP ] Efficient KEMs with Partial Message Recovery. [Citation Graph (, )][DBLP ] Relations Among Notions of Plaintext Awareness. [Citation Graph (, )][DBLP ] Certificateless Encryption Schemes Strongly Secure in the Standard Model. [Citation Graph (, )][DBLP ] Confidential Signatures and Deterministic Signcryption. [Citation Graph (, )][DBLP ] A Brief History of Security Models for Confidentiality. [Citation Graph (, )][DBLP ] A Brief History of Provably-Secure Public-Key Encryption. [Citation Graph (, )][DBLP ] Broadcast Encryption with Multiple Trust Authorities. [Citation Graph (, )][DBLP ] Point-weight designs with design conditions on t points. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs