Cryptography Reference
In-Depth Information
31. R. Cramer, editor. Advances in Cryptology - EUROCRYPT 2005, 24th An-
nual International Conference on the Theory and Applications of Cryptographic
Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, volume 3494 of
Lecture Notes in Computer Science. Springer, 2005.
32. J. Daemen and V. Rijmen. The Design of Rijndael: AES- The Advanced En-
cryption Standard. Springer, New York, 2002.
33. C. Delerablee. Identity-based broadcast encryption with constant size cipher-
texts and private keys. In ASIACRYPT, pages 200-215, 2007.
34. C. Delerablee, P. Paillier, and D. Pointcheval. Fully collusion secure dynamic
broadcast encryption with constant-size ciphertexts or decryption keys. In
T. Takagi, T. Okamoto, E. Okamoto, and T. Okamoto, editors, Pairing, volume
4575 of Lecture Notes in Computer Science, pages 39-59. Springer, 2007.
35. Y. Dodis and N. Fazio. Public key broadcast encryption for stateless receivers.
In Feigenbaum [ 41 ] , pages 61-80.
36. Y. Dodis and N. Fazio. Public key trace and revoke scheme secure against
adaptive chosen ciphertext attack. In Y. Desmedt, editor, Public Key Cryp-
tography, volume 2567 of Lecture Notes in Computer Science, pages 100-115.
Springer, 2003.
37. Y. Dodis, N. Fazio, A. Kiayias, and M. Yung. Scalable public-key tracing and
revoking. In PODC, pages 190-199, 2003.
38. C. Dwork, M. Naor, O. Reingold, G. N. Rothblum, and S. P. Vadhan. On
the complexity of differentially private data release: e cient algorithms and
hardness results. In M. Mitzenmacher, editor, STOC, pages 381-390. ACM,
2009.
39. N. Fazio, A. Nicolosi, and D. H. Phan. Traitor tracing with optimal transmis-
sion rate. In J. A. Garay, A. K. Lenstra, M. Mambo, and R. Peralta, editors,
ISC, volume 4779 of Lecture Notes in Computer Science, pages 71-88. Springer,
2007.
40. U. Feige, P. Raghavan, D. Peleg, and E. Upfal. Computing with noisy infor-
mation. SIAM J. Comput., 23(5):1001-1018, 1994.
41. J. Feigenbaum, editor. Security and Privacy in Digital Rights Management,
ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18,
2002, Revised Papers, volume 2696 of Lecture Notes in Computer Science.
Springer, 2003.
42. A. Fiat and M. Naor. Broadcast encryption. In Stinson [ 112 ] , pages 480-491.
43. A. Fiat and T. Tassa. Dynamic traitor training. In Wiener [ 124 ], pages 354-
371.
44. J. Furukawa and N. Attrapadung. Fully collusion resistant black-box traitor
revocable broadcast encryption with short private keys. In L. Arge, C. Cachin,
T. Jurdzinski, and A. Tarlecki, editors, ICALP, volume 4596 of Lecture Notes
in Computer Science, pages 496-508. Springer, 2007.
45. E. Gafni, J. Staddon, and Y. L. Yin. E cient methods for integrating trace-
ability and broadcast encryption. In Wiener [ 124 ], pages 372-387.
46. S. D. Galbraith, K. G. Paterson, and N. P. Smart. Pairings for cryptographers.
Discrete Applied Mathematics, 156(16):3113-3121, 2008.
47. J. A. Garay, J. Staddon, and A. Wool. Long-lived broadcast encryption. In
Bellare [ 8 ] , pages 333-352.
48. M. R. Garey, D. S. Johnson, and L. J. Stockmeyer. Some simplified np-complete
problems. In STOC, pages 47-63, 1974.
 
 
Search WWH ::




Custom Search