


default search action
ProvSec 2008: Shanghai, China
- Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai:

Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings. Lecture Notes in Computer Science 5324, Springer 2008, ISBN 978-3-540-88732-4
Encryption
- Huawei Huang, Bo Yang, Shenglin Zhu, Guozhen Xiao:

Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. 1-21 - Atsushi Mitsuda, Tetsu Iwata:

Tweakable Pseudorandom Permutation from Generalized Feistel Structure. 22-37 - Sherman S. M. Chow

, Siu-Ming Yiu:
Timed-Release Encryption Revisited. 38-51 - S. Sharmila Deva Selvi, S. Sree Vivek, Deepanshu Shukla, C. Pandu Rangan:

Efficient and Provably Secure Certificateless Multi-receiver Signcryption. 52-67 - Yvo Desmedt, Duong Hieu Phan

:
A CCA Secure Hybrid Damgård's ElGamal Encryption. 68-82
Signature
- Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:

Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. 83-97 - Fuchun Guo

, Yi Mu:
Optimal Online/Offline Signature: How to Sign a Message without Online Computation. 98-111 - Kristian Gjøsteen, Lillian Kråkmo:

Round-Optimal Blind Signatures from Waters Signatures. 112-126 - Zhenhua Liu, Yupu Hu, Hua Ma:

Secure Proxy Multi-signature Scheme in the Standard Model. 127-140 - Wei Wu, Yi Mu, Willy Susilo

, Xinyi Huang:
Server-Aided Verification Signatures: Definitions and New Constructions. 141-155
Analysis
- Liqun Chen

, Paul Morrissey, Nigel P. Smart:
On Proofs of Security for DAA Schemes. 156-175 - Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:

Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. 176-184 - Zhengqin Luo:

Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups. 185-199 - Tibor Jager, Jörg Schwenk:

On the Equivalence of Generic Group Models. 200-209 - Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang:

The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. 210-225
Application of Hash Functions
- Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta:

Leaky Random Oracle (Extended Abstract). 226-240 - Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, Pascal Paillier, Thomas Peyrin:

How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions. 241-253 - Ahto Buldas, Margus Niitsoo:

Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?. 254-267
Universal Composability
- Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:

Relationship of Three Cryptographic Channels in the UC Framework. 268-282 - Sebastian Gajek:

A Universally Composable Framework for the Analysis of Browser-Based Security Protocols. 283-297 - Peeter Laud, Long Ngo:

Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library. 298-312 - Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk:

Universally Composable Security Analysis of TLS. 313-327 - Huafei Zhu:

Round Optimal Universally Composable Oblivious Transfer Protocols. 328-334
Applications
- Wei Han, Tao Hao, Dong Zheng, Kefei Chen, Xiaofeng Chen:

A Tamper-Evident Voting Machine Resistant to Covert Channels. 335-344 - Wei Du, Mingxing He:

Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. 345-359

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














