The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Alexander W. Dent: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alexander W. Dent
    Hybrid Signcryption Schemes with Insider Security. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:253-266 [Conf]
  2. Alexander W. Dent, Steven D. Galbraith
    Hidden Pairings and Trapdoor DDH Groups. [Citation Graph (0, 0)][DBLP]
    ANTS, 2006, pp:436-451 [Conf]
  3. Alexander W. Dent
    Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:100-109 [Conf]
  4. Alexander W. Dent
    The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:289-307 [Conf]
  5. Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart
    Identity-Based Encryption Gone Wild. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:300-311 [Conf]
  6. Alexander W. Dent
    A Designer's Guide to KEMs. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:133-151 [Conf]
  7. Alexander W. Dent, John Malone-Lee
    The Physically Observable Security of Signature Schemes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:220-232 [Conf]
  8. Alexander W. Dent
    Hybrid Signcryption Schemes with Outsider Security. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:203-217 [Conf]
  9. Tor E. Bjørstad, Alexander W. Dent
    Building Better Signcryption Schemes with Tag-KEMs. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:491-507 [Conf]
  10. James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt
    Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:274-292 [Conf]
  11. Alexander W. Dent, Qiang Tang
    Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:158-174 [Conf]
  12. Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart
    Identity-Based Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:361-376 [Conf]

  13. Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. [Citation Graph (, )][DBLP]


  14. Efficient KEMs with Partial Message Recovery. [Citation Graph (, )][DBLP]


  15. Relations Among Notions of Plaintext Awareness. [Citation Graph (, )][DBLP]


  16. Certificateless Encryption Schemes Strongly Secure in the Standard Model. [Citation Graph (, )][DBLP]


  17. Confidential Signatures and Deterministic Signcryption. [Citation Graph (, )][DBLP]


  18. A Brief History of Security Models for Confidentiality. [Citation Graph (, )][DBLP]


  19. A Brief History of Provably-Secure Public-Key Encryption. [Citation Graph (, )][DBLP]


  20. Broadcast Encryption with Multiple Trust Authorities. [Citation Graph (, )][DBLP]


  21. Point-weight designs with design conditions on t points. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002