Search the dblp DataBase
David Galindo :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Eike Kiltz , David Galindo Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:336-347 [Conf ] David Galindo , Javier Herranz , Eike Kiltz On the Generic Construction of Identity-Based Signatures with Additional Properties. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:178-193 [Conf ] David Galindo , Paz Morillo , Carla Ràfols Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:81-91 [Conf ] David Galindo , Javier Herranz A Generic Construction for Token-Controlled Public Key Encryption. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:177-190 [Conf ] David Galindo Boneh-Franklin Identity Based Encryption Revisited. [Citation Graph (0, 0)][DBLP ] ICALP, 2005, pp:791-802 [Conf ] David Galindo A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:318-326 [Conf ] David Galindo , Sebastià Martín Molleví , Tsuyoshi Takagi , Jorge Luis Villar A Provably Secure Elliptic Curve Scheme with Fast Encryption. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:245-259 [Conf ] David Galindo , Sebastià Martín Molleví , Paz Morillo , Jorge Luis Villar Easy Verifiable Primitives and Practical Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:69-83 [Conf ] Nuttapong Attrapadung , Yang Cui , David Galindo , Goichiro Hanaoka , Ichiro Hasuo , Hideki Imai , Kanta Matsuura , Peng Yang 0002 , Rui Zhang 0002 Relations Among Notions of Security for Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP ] LATIN, 2006, pp:130-141 [Conf ] Ricardo Corin , David Galindo , Jaap-Henk Hoepman Securing Data Accountability in Decentralized Systems. [Citation Graph (0, 0)][DBLP ] OTM Workshops (1), 2006, pp:626-635 [Conf ] David Galindo , Sebastià Martín Molleví , Paz Morillo , Jorge Luis Villar A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2003, pp:279-291 [Conf ] David Galindo , Eike Kiltz Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles. [Citation Graph (0, 0)][DBLP ] SCN, 2006, pp:173-185 [Conf ] David Galindo , Sebastià Martín Molleví , Paz Morillo , Jorge Luis Villar Fujisaki-Okamoto hybrid encryption revisited. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:4, pp:228-241 [Journal ] A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. [Citation Graph (, )][DBLP ] Computational Soundness of Non-Malleable Commitments. [Citation Graph (, )][DBLP ] Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). [Citation Graph (, )][DBLP ] A Schnorr-Like Lightweight Identity-Based Signature Scheme. [Citation Graph (, )][DBLP ] Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. [Citation Graph (, )][DBLP ] Improved identity-based identification using correcting codes [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs