Author of the publication

Combined schemes for signature and encryption: The public-key and the identity-based setting.

, , and . Inf. Comput., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructive and Destructive Facets of Weil Descent on Elliptic Curves., , and . J. Cryptology, 15 (1): 19-46 (2002)On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham.. Inf. Process. Lett., 89 (3): 111-114 (2004)Aspects of Pairing Inversion., , and . IEEE Trans. Information Theory, 54 (12): 5719-5728 (2008)Generalised Jacobians in Cryptography and Coding Theory.. WAIFI, volume 7369 of Lecture Notes in Computer Science, page 1-15. Springer, (2012)Computing Riemann-Roch Spaces in Algebraic Function Fields and Related Topics.. J. Symb. Comput., 33 (4): 425-445 (2002)Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings.. IACR Cryptology ePrint Archive, (2002)Hyperelliptic Pairings., , and . Pairing, volume 4575 of Lecture Notes in Computer Science, page 108-131. Springer, (2007)Pairing Lattices.. Pairing, volume 5209 of Lecture Notes in Computer Science, page 18-38. Springer, (2008)An Algorithm for Computing Isomorphisms of Algebraic Function Fields.. ANTS, volume 3076 of Lecture Notes in Computer Science, page 263-271. Springer, (2004)Optimised Versions of the Ate and Twisted Ate Pairings., , , and . IEICE Transactions, 92-A (7): 1660-1667 (2009)