On multivariate signature-only public key cryptosystems (original) (raw)

New candidates for multivariate trapdoor functions and new multivariate public key encryption schemes

Jaiberth Porras Barrera

2013

View PDFchevron_right

Generalized public-key cryptography with tight security

Willy Susilo

Information Sciences, 2019

View PDFchevron_right

Efficient Public-Key Cryptography in the Presence of Key Leakage

pok lim

2010

View PDFchevron_right

On the security of public key cryptosystems with a double decryption mechanism

David Galindo

Information Processing Letters, 2008

View PDFchevron_right

Certificate-based signatures revisited

Willy Susilo

2009

View PDFchevron_right

Probabilistic Multivariate Cryptography

Aline Gouget

Lecture Notes in Computer Science, 2006

View PDFchevron_right

The Joint Signature and Encryption Revisited ∗

Laila El Aimani

2013

View PDFchevron_right

A New Security Definition for Public Key Encryption Schemes and Its Applications

Xiaotie Deng

View PDFchevron_right

Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs

Dominique Schröder

Lecture Notes in Computer Science, 2010

View PDFchevron_right

Generic Constructions for Verifiably Encrypted Signatures Without Random Oracles or NIZKs–preliminary draft–

Dominique Schröder

eprint.iacr.org

View PDFchevron_right

Public-key encryption with non-interactive opening: New constructions and stronger definitions

Dominique Schröder

Progress in Cryptology …, 2010

View PDFchevron_right

Certificate-Based Signature: Security Model and Efficient Construction

qianhong wu

2007

View PDFchevron_right

A Novel Public Key Cryptosystem and Digital Signatures

Shamsa Kanwal, Saba Inam

European Journal of Engineering Science and Technology, 1970

View PDFchevron_right

Certificateless Public-Key Signature: Security Model and Efficient Construction

Jing Xu

2006

View PDFchevron_right

A new public-key cryptosystem as secure as factoring

Tatsuaki Okamoto

Lecture Notes in Computer Science, 1998

View PDFchevron_right

Aggregate and verifiably encrypted signatures from multilinear maps without random oracles

Dominique Schröder

Advances in Information Security and Assurance, 2009

View PDFchevron_right

On the Provable Security of Multi-Receiver Signcryption Schemes

Raga Gopalakrishnan

View PDFchevron_right

On the Security of Certificateless Signcryption Schemes

sree vivek

View PDFchevron_right

Public-Key Cryptography Theory and Practice

jc zamora

View PDFchevron_right

On Constructions and Security Notions of Public-key Cryptosystems

Angsuman Das

Book Chapter, Contemporary Topics in Mathematics and Statistics with Applications, Volume-I, Asian Books Pvt Ltd., 2012

View PDFchevron_right

Easy Verifiable Primitives and Practical Public Key Cryptosystems

David Galindo

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Non-interactive multisignatures in the plain public-key model with efficient verification

Shouhuai Xu

2010

View PDFchevron_right

Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes Such As HFE, Quartz and Sflash

Nicolas Courtois

Polynomial Schemes such as HFE, Quartz and Sflash.” …, 2004

View PDFchevron_right

Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem

Sumit Kumar Debnath

Proceedings of the 18th International Conference on Security and Cryptography, 2021

View PDFchevron_right

An Improved Certificateless Public Key Encryption

Denise Goya

2006

View PDFchevron_right

A Public Key Exchange Cryptosystem Based on Ideal Secrecy

Virendra Sule

2018

View PDFchevron_right

Certificateless Signatures: New Schemes and Security Models

Willy Susilo

The Computer Journal, 2012

View PDFchevron_right

New security notions and relations for public-key encryption

Siamak F Shahandashti

Journal of Mathematical Cryptology, 2012

View PDFchevron_right

Certificateless KEM and Hybrid Signcryption Schemes Revisited

sree vivek

Lecture Notes in Computer Science, 2010

View PDFchevron_right

Contribution to Privacy-Preserving Cryptographic Techniques

Man Ho Au

View PDFchevron_right

Certificateless signature: a new security model and an improved generic construction

Xiaotie Deng

Designs, Codes and Cryptography, 2007

View PDFchevron_right

A Generic Construction for Token-Controlled Public Key Encryption

David Galindo

2006

View PDFchevron_right

On the Security of Certificateless Signature Schemes from Asiacrypt 2003

Willy Susilo

Lecture Notes in Computer Science, 2005

View PDFchevron_right

On the Security Notions for Public-Key Encryption Schemes

Hieu Phan

2004

View PDFchevron_right

Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries

Vincent Rijmen

Lecture Notes in Computer Science, 1999

View PDFchevron_right