The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David Galindo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Eike Kiltz, David Galindo
    Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:336-347 [Conf]
  2. David Galindo, Javier Herranz, Eike Kiltz
    On the Generic Construction of Identity-Based Signatures with Additional Properties. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:178-193 [Conf]
  3. David Galindo, Paz Morillo, Carla Ràfols
    Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:81-91 [Conf]
  4. David Galindo, Javier Herranz
    A Generic Construction for Token-Controlled Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:177-190 [Conf]
  5. David Galindo
    Boneh-Franklin Identity Based Encryption Revisited. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:791-802 [Conf]
  6. David Galindo
    A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:318-326 [Conf]
  7. David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar
    A Provably Secure Elliptic Curve Scheme with Fast Encryption. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:245-259 [Conf]
  8. David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar
    Easy Verifiable Primitives and Practical Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:69-83 [Conf]
  9. Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang 0002, Rui Zhang 0002
    Relations Among Notions of Security for Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    LATIN, 2006, pp:130-141 [Conf]
  10. Ricardo Corin, David Galindo, Jaap-Henk Hoepman
    Securing Data Accountability in Decentralized Systems. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:626-635 [Conf]
  11. David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar
    A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:279-291 [Conf]
  12. David Galindo, Eike Kiltz
    Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:173-185 [Conf]
  13. David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar
    Fujisaki-Okamoto hybrid encryption revisited. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:4, pp:228-241 [Journal]

  14. A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  15. Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. [Citation Graph (, )][DBLP]


  16. Computational Soundness of Non-Malleable Commitments. [Citation Graph (, )][DBLP]


  17. Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). [Citation Graph (, )][DBLP]


  18. A Schnorr-Like Lightweight Identity-Based Signature Scheme. [Citation Graph (, )][DBLP]


  19. Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. [Citation Graph (, )][DBLP]


  20. Improved identity-based identification using correcting codes [Citation Graph (, )][DBLP]


Search in 0.030secs, Finished in 0.031secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002