Alexander W. Dent

According to our database1, Alexander W. Dent authored at least 37 papers between 2002 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2014
Security Models and Proof Strategies for Plaintext-Aware Encryption.
J. Cryptology, 2014

2012
Aggregate Signcryption.
IACR Cryptol. ePrint Arch., 2012

2011
Certificateless Cryptography.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Wildcarded Identity-Based Encryption.
J. Cryptology, 2011

2010
Signcryption Schemes Based on the RSA Problem.
Proceedings of the Practical Signcryption, 2010

Key Establishment Using Signcryption Techniques.
Proceedings of the Practical Signcryption, 2010

Choosing key sizes for cryptography.
Inf. Secur. Tech. Rep., 2010

Broadcast Encryption with Multiple Trust Authorities.
Proceedings of the Progress in Cryptology, 2010

2009
Confidential Signatures and Deterministic Signcryption.
IACR Cryptol. ePrint Arch., 2009

A Brief History of Provably-Secure Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2009

A Brief History of Security Models for Confidentiality.
Proceedings of the Provable Security, Third International Conference, 2009

A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

2008
A survey of certificateless encryption schemes and security models.
Int. J. Inf. Sec., 2008

Point-weight designs with design conditions on t points.
Discret. Math., 2008

2007
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
IACR Cryptol. ePrint Arch., 2007

Certificateless Encryption Schemes Strongly Secure in the Standard Model.
IACR Cryptol. ePrint Arch., 2007

Relations Among Notions of Plaintext Awareness.
IACR Cryptol. ePrint Arch., 2007

Identity-Based Traitor Tracing.
Proceedings of the Public Key Cryptography, 2007

Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability.
Proceedings of the Information Security, 10th International Conference, 2007

Efficient KEMs with Partial Message Recovery.
Proceedings of the Cryptography and Coding, 2007

2006
Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability.
IACR Cryptol. ePrint Arch., 2006

Fundamental problems in provable security and cryptography.
IACR Cryptol. ePrint Arch., 2006

A Note On Game-Hopping Proofs.
IACR Cryptol. ePrint Arch., 2006

The Hardness of the DHK Problem in the Generic Group Model.
IACR Cryptol. ePrint Arch., 2006

Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.
IACR Cryptol. ePrint Arch., 2006

Identity-Based Encryption Gone Wild.
IACR Cryptol. ePrint Arch., 2006

Hidden Pairings and Trapdoor DDH Groups.
Proceedings of the Algorithmic Number Theory, 7th International Symposium, 2006

2005
Flaws in an e-mail protocol of Sun, Hsieh, and Hwang.
IEEE Communications Letters, 2005

The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model.
IACR Cryptol. ePrint Arch., 2005

Building Better Signcryption Schemes with Tag-KEMs.
IACR Cryptol. ePrint Arch., 2005

Hybrid Signcryption Schemes with Outsider Security.
Proceedings of the Information Security, 8th International Conference, 2005

The Physically Observable Security of Signature Schemes.
Proceedings of the Cryptography and Coding, 2005

Hybrid Signcryption Schemes with Insider Security.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Regional Blackouts: Protection of Broadcast Content on 3G Networks.
IACR Cryptol. ePrint Arch., 2004

Hybrid Cryptography.
IACR Cryptol. ePrint Arch., 2004

2002
A Designer's Guide to KEMs.
IACR Cryptol. ePrint Arch., 2002

Adapting the weaknesses of the Random Oracle model to the Generic Group model.
IACR Cryptol. ePrint Arch., 2002


  Loading...