# Alexander W. Dent

According to our database

Collaborative distances:

^{1}, Alexander W. Dent authored at least 49 papers between 2002 and 2014.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2014

Security Models and Proof Strategies for Plaintext-Aware Encryption.

J. Cryptology, 2014

2012

Aggregate Signcryption.

IACR Cryptology ePrint Archive, 2012

2011

Certificateless Cryptography.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Wildcarded Identity-Based Encryption.

J. Cryptology, 2011

2010

Signcryption Schemes Based on the RSA Problem.

Proceedings of the Practical Signcryption, 2010

Key Establishment Using Signcryption Techniques.

Proceedings of the Practical Signcryption, 2010

Choosing key sizes for cryptography.

Inf. Sec. Techn. Report, 2010

Confidential Signatures and Deterministic Signcryption.

Proceedings of the Public Key Cryptography, 2010

Broadcast Encryption with Multiple Trust Authorities.

Proceedings of the Progress in Cryptology, 2010

2009

Confidential Signatures and Deterministic Signcryption.

IACR Cryptology ePrint Archive, 2009

A Brief History of Provably-Secure Public-Key Encryption.

IACR Cryptology ePrint Archive, 2009

A Brief History of Security Models for Confidentiality.

Proceedings of the Provable Security, Third International Conference, 2009

A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures.

Proceedings of the Public Key Infrastructures, Services and Applications, 2009

2008

A survey of certificateless encryption schemes and security models.

Int. J. Inf. Sec., 2008

Point-weight designs with design conditions on t points.

Discrete Mathematics, 2008

Certificateless Encryption Schemes Strongly Secure in the Standard Model.

Proceedings of the Public Key Cryptography, 2008

Relations Among Notions of Plaintext Awareness.

Proceedings of the Public Key Cryptography, 2008

Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.

Proceedings of the Advances in Cryptology, 2008

A Brief History of Provably-Secure Public-Key Encryption.

Proceedings of the Progress in Cryptology, 2008

2007

Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.

IACR Cryptology ePrint Archive, 2007

Certificateless Encryption Schemes Strongly Secure in the Standard Model.

IACR Cryptology ePrint Archive, 2007

Relations Among Notions of Plaintext Awareness.

IACR Cryptology ePrint Archive, 2007

Identity-Based Traitor Tracing.

Proceedings of the Public Key Cryptography, 2007

Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability.

Proceedings of the Information Security, 10th International Conference, 2007

Efficient KEMs with Partial Message Recovery.

Proceedings of the Cryptography and Coding, 2007

Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.

Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006

Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability.

IACR Cryptology ePrint Archive, 2006

Fundamental problems in provable security and cryptography.

IACR Cryptology ePrint Archive, 2006

A Note On Game-Hopping Proofs.

IACR Cryptology ePrint Archive, 2006

A Survey of Certificateless Encryption Schemes and Security Models.

IACR Cryptology ePrint Archive, 2006

The Hardness of the DHK Problem in the Generic Group Model.

IACR Cryptology ePrint Archive, 2006

Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.

IACR Cryptology ePrint Archive, 2006

Identity-Based Encryption Gone Wild.

IACR Cryptology ePrint Archive, 2006

Building Better Signcryption Schemes with Tag-KEMs.

Proceedings of the Public Key Cryptography, 2006

Identity-Based Encryption Gone Wild.

Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model.

Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Hidden Pairings and Trapdoor DDH Groups.

Proceedings of the Algorithmic Number Theory, 7th International Symposium, 2006

2005

Flaws in an e-mail protocol of Sun, Hsieh, and Hwang.

IEEE Communications Letters, 2005

The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model.

IACR Cryptology ePrint Archive, 2005

Building Better Signcryption Schemes with Tag-KEMs.

IACR Cryptology ePrint Archive, 2005

Hybrid Signcryption Schemes with Outsider Security.

Proceedings of the Information Security, 8th International Conference, 2005

The Physically Observable Security of Signature Schemes.

Proceedings of the Cryptography and Coding, 2005

Hybrid Signcryption Schemes with Insider Security.

Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004

Regional Blackouts: Protection of Broadcast Content on 3G Networks.

IACR Cryptology ePrint Archive, 2004

Hybrid Cryptography.

IACR Cryptology ePrint Archive, 2004

2003

A Designer's Guide to KEMs.

Proceedings of the Cryptography and Coding, 2003

2002

A Designer's Guide to KEMs.

IACR Cryptology ePrint Archive, 2002

Adapting the weaknesses of the Random Oracle model to the Generic Group model.

IACR Cryptology ePrint Archive, 2002

Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model.

Proceedings of the Advances in Cryptology, 2002