The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DHIES with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2001-2017 (14)
Publication types (Num. hits)
article(2) inproceedings(12)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 16 occurrences of 13 keywords

Results
Found 14 publication records. Showing 14 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
179Yu Chen 0003, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen 0001 Identity-based encryption based on DHIES. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF DHIES, combination, identity-based encryption, bilinear map
133Kaoru Kurosawa, Toshihiko Matsuo How to Remove MAC from DHIES. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DHIES, hybrid encryption scheme
104Michel Abdalla, Mihir Bellare, Phillip Rogaway The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptographic standards, Diffie-Hellman key exchange, provable security, elliptic curve cryptosystems, generic model, ElGamal encryption
75Palash Sarkar 0001 HEAD: Hybrid Encryption with Delegated Decryption Capability. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DHIES, delegated decryption, public key encryption
52Dennis Hofheinz, Eike Kiltz The Group of Signed Quadratic Residues and Applications. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hybrid ElGamal/DHIES, Public-key encryption, chosen-ciphertext security
46Bodo Möller A Public-Key Encryption Scheme with Pseudo-random Ciphertexts. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Ron Steinfeld, Joonsang Baek, Yuliang Zheng 0001 On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Honglong Dai, Luxuan Zhang, Janyan Ji, Jinyong Chang, Maozhi Xu On the key dependent message security of DHIES. Search on Bibsonomy ICAIT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Ping Pan, Lihua Wang 0001, Licheng Wang, Lixiang Li 0001, Yixian Yang CSP-DHIES: a new public-key encryption scheme from matrix conjugation. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Willy Susilo, Joonsang Baek On the security of the identity-based encryption based on DHIES from ASIACCS 2010. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
35Martin R. Albrecht, Kenneth G. Paterson Breaking an Identity-Based Encryption Scheme Based on DHIES. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
35Martin R. Albrecht, Kenneth G. Paterson Breaking An Identity-Based Encryption Scheme based on DHIES. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
23Mihir Bellare, Tadayoshi Kohno, Victor Shoup Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptography, public-key encryption
23Mihir Bellare, Alexandra Boldyreva, Jessica Staddon Randomness Re-use in Multi-recipient Encryption Schemeas. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Encryption, provable security, randomness, broadcast encryption
Displaying result #1 - #14 of 14 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license