The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nuttapong Attrapadung: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nuttapong Attrapadung, Jun Furukawa, Hideki Imai
    Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:161-177 [Conf]
  2. Nuttapong Attrapadung, Hideki Imai
    Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:100-120 [Conf]
  3. Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai
    Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:374-391 [Conf]
  4. Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002
    Efficient Identity-Based Encryption with Tight Security Reduction. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:19-36 [Conf]
  5. Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai
    Broadcast encryption with short keys and transmissions. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:55-66 [Conf]
  6. Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang 0002, Rui Zhang 0002
    Relations Among Notions of Security for Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    LATIN, 2006, pp:130-141 [Conf]
  7. Jun Furukawa, Nuttapong Attrapadung
    Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys. [Citation Graph (0, 0)][DBLP]
    ICALP, 2007, pp:496-508 [Conf]
  8. Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
    A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:68-84 [Conf]

  9. Dual-Policy Attribute Based Encryption. [Citation Graph (, )][DBLP]


  10. Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes. [Citation Graph (, )][DBLP]


  11. A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low. [Citation Graph (, )][DBLP]


  12. Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation. [Citation Graph (, )][DBLP]


  13. Conjunctive Broadcast and Attribute-Based Encryption. [Citation Graph (, )][DBLP]


Search in 0.095secs, Finished in 0.097secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002