BibTeX records: David Galindo

download as .bib file

@article{DBLP:journals/distribledger/0008L0G0023,
  author       = {Qin Wang and
                  Rujia Li and
                  Qi Wang and
                  David Galindo and
                  Shiping Chen and
                  Yang Xiang},
  title        = {Transparent Registration-Based Encryption through Blockchain},
  journal      = {Distributed Ledger Technol. Res. Pract.},
  volume       = {2},
  number       = {1},
  pages        = {3:1--3:14},
  year         = {2023},
  url          = {https://doi.org/10.1145/3568315},
  doi          = {10.1145/3568315},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/distribledger/0008L0G0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LiWWGR22,
  author       = {Rujia Li and
                  Qin Wang and
                  Qi Wang and
                  David Galindo and
                  Mark Ryan},
  title        = {SoK: TEE-Assisted Confidential Smart Contract},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {3},
  pages        = {711--731},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0093},
  doi          = {10.56553/POPETS-2022-0093},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/LiWWGR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GalindoL22,
  author       = {David Galindo and
                  Jia Liu},
  editor       = {Steven D. Galbraith},
  title        = {Robust Subgroup Multi-signatures for Consensus},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the
                  {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13161},
  pages        = {537--561},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-95312-6\_22},
  doi          = {10.1007/978-3-030-95312-6\_22},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GalindoL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-08699,
  author       = {Rujia Li and
                  Qin Wang and
                  Qi Wang and
                  David Galindo},
  title        = {How Do Smart Contracts Benefit Security Protocols?},
  journal      = {CoRR},
  volume       = {abs/2202.08699},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.08699},
  eprinttype    = {arXiv},
  eprint       = {2202.08699},
  timestamp    = {Mon, 23 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-08699.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-08548,
  author       = {Rujia Li and
                  Qin Wang and
                  Qi Wang and
                  David Galindo and
                  Mark Ryan},
  title        = {SoK: TEE-assisted Confidential Smart Contract},
  journal      = {CoRR},
  volume       = {abs/2203.08548},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.08548},
  doi          = {10.48550/ARXIV.2203.08548},
  eprinttype    = {arXiv},
  eprint       = {2203.08548},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-08548.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/GalindoLOW21,
  author       = {David Galindo and
                  Jia Liu and
                  Mihai Ordean and
                  Jin{-}Mann Wong},
  title        = {Fully Distributed Verifiable Random Functions and their Application
                  to Decentralised Random Beacons},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {88--102},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00017},
  doi          = {10.1109/EUROSP51992.2021.00017},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/GalindoLOW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbc2/LiWZWGX21,
  author       = {Rujia Li and
                  Qin Wang and
                  Xinrui Zhang and
                  Qi Wang and
                  David Galindo and
                  Yang Xiang},
  title        = {An Offline Delegatable Cryptocurrency System},
  booktitle    = {{IEEE} International Conference on Blockchain and Cryptocurrency,
                  {ICBC} 2021, Sydney, Australia, May 3-6, 2021},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICBC51069.2021.9461112},
  doi          = {10.1109/ICBC51069.2021.9461112},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icbc2/LiWZWGX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-12905,
  author       = {Rujia Li and
                  Qin Wang and
                  Xinrui Zhang and
                  Qi Wang and
                  David Galindo and
                  Yang Xiang},
  title        = {An Offline Delegatable Cryptocurrency System},
  journal      = {CoRR},
  volume       = {abs/2103.12905},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.12905},
  eprinttype    = {arXiv},
  eprint       = {2103.12905},
  timestamp    = {Mon, 23 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-12905.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-12456,
  author       = {David Galindo and
                  Jia Liu and
                  Chris McMahon Stone and
                  Mihai Ordean},
  title        = {SoK: Untangling File-based Encryption on Mobile Devices},
  journal      = {CoRR},
  volume       = {abs/2111.12456},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.12456},
  eprinttype    = {arXiv},
  eprint       = {2111.12456},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-12456.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LiWL0G20,
  author       = {Rujia Li and
                  Qin Wang and
                  Feng Liu and
                  Qi Wang and
                  David Galindo},
  editor       = {Willy Susilo and
                  Robert H. Deng and
                  Fuchun Guo and
                  Yannan Li and
                  Rolly Intan},
  title        = {An Accountable Decryption System Based on Privacy-Preserving Smart
                  Contracts},
  booktitle    = {Information Security - 23rd International Conference, {ISC} 2020,
                  Bali, Indonesia, December 16-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12472},
  pages        = {372--390},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62974-8\_21},
  doi          = {10.1007/978-3-030-62974-8\_21},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LiWL0G20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-05390,
  author       = {Marcin Abram and
                  David Galindo and
                  Daniel Honerkamp and
                  Jonathan Ward and
                  Jin{-}Mann Wong},
  title        = {Democratising blockchain: {A} minimal agency consensus model},
  journal      = {CoRR},
  volume       = {abs/2006.05390},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.05390},
  eprinttype    = {arXiv},
  eprint       = {2006.05390},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-05390.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoLOW20,
  author       = {David Galindo and
                  Jia Liu and
                  Mihai Ordean and
                  Jin{-}Mann Wong},
  title        = {Fully Distributed Verifiable Random Functions and their Application
                  to Decentralised Random Beacons},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/096},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoLOW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoL20,
  author       = {David Galindo and
                  Jia Liu},
  title        = {Robust Subgroup Multi-Signatures for Consensus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1478},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1478},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiGW19,
  author       = {Rujia Li and
                  David Galindo and
                  Qi Wang},
  editor       = {Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Guillermo Navarro{-}Arribas and
                  Alex Biryukov and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Auditable Credential Anonymity Revocation Based on Privacy-Preserving
                  Smart Contracts},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2019 International Workshops, {DPM} 2019 and {CBT} 2019,
                  Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11737},
  pages        = {355--371},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31500-9\_23},
  doi          = {10.1007/978-3-030-31500-9\_23},
  timestamp    = {Mon, 05 Feb 2024 20:29:40 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LiGW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Ordean0G19,
  author       = {Mihai Ordean and
                  Mark Ryan and
                  David Galindo},
  editor       = {Florian Kerschbaum and
                  Atefeh Mashatan and
                  Jianwei Niu and
                  Adam J. Lee},
  title        = {{CAOS:} Concurrent-Access Obfuscated Store},
  booktitle    = {Proceedings of the 24th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3322431.3325101},
  doi          = {10.1145/3322431.3325101},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/Ordean0G19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-02443,
  author       = {Rujia Li and
                  David Galindo and
                  Qi Wang},
  title        = {Auditable Credential Anonymity Revocation Based on Privacy-Preserving
                  Smart Contracts},
  journal      = {CoRR},
  volume       = {abs/1908.02443},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.02443},
  eprinttype    = {arXiv},
  eprint       = {1908.02443},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-02443.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/CortierGT18,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  Mathieu Turuani},
  title        = {A Formal Analysis of the Neuchatel e-Voting Protocol},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {430--442},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00037},
  doi          = {10.1109/EUROSP.2018.00037},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/CortierGT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-10412,
  author       = {Mihai Ordean and
                  Mark Ryan and
                  David Galindo},
  title        = {{CAOS:} Concurrent-Access Obfuscated Store},
  journal      = {CoRR},
  volume       = {abs/1709.10412},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.10412},
  eprinttype    = {arXiv},
  eprint       = {1709.10412},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-10412.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DagdelenGVAC16,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  David Galindo and
                  Pascal V{\'{e}}ron and
                  Sidi Mohamed El Yousfi Alaoui and
                  Pierre{-}Louis Cayrel},
  title        = {Extended security arguments for signature schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {441--461},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0009-7},
  doi          = {10.1007/S10623-014-0009-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DagdelenGVAC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GalindoG0VV16,
  author       = {David Galindo and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Zhe Liu and
                  Praveen Kumar Vadnala and
                  Srinivas Vivek},
  title        = {Implementation of a leakage-resilient ElGamal key encapsulation mechanism},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {3},
  pages        = {229--238},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0121-x},
  doi          = {10.1007/S13389-016-0121-X},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/GalindoG0VV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChaidosCFG16,
  author       = {Pyrros Chaidos and
                  V{\'{e}}ronique Cortier and
                  Georg Fuchsbauer and
                  David Galindo},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {BeleniosRF: {A} Non-interactive Receipt-Free Electronic Voting Scheme},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1614--1625},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978337},
  doi          = {10.1145/2976749.2978337},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChaidosCFG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/CucurullGG16,
  author       = {Jordi Cucurull and
                  Sandra Guasch and
                  David Galindo},
  editor       = {Mohammad S. Obaidat},
  title        = {A Javascript Voting Client for Remote Online Voting},
  booktitle    = {E-Business and Telecommunications - 13th International Joint Conference,
                  {ICETE} 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {764},
  pages        = {266--290},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-67876-4\_13},
  doi          = {10.1007/978-3-319-67876-4\_13},
  timestamp    = {Mon, 21 Jan 2019 11:20:27 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/CucurullGG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CucurullGG16,
  author       = {Jordi Cucurull and
                  Sandra Guasch and
                  David Galindo},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Transitioning to a Javascript Voting Client for Remote Online Voting},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {121--132},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005967301210132},
  doi          = {10.5220/0005967301210132},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CucurullGG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CortierGKMT16,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  Ralf K{\"{u}}sters and
                  Johannes M{\"{u}}ller and
                  Tomasz Truderung},
  title        = {SoK: Verifiability Notions for E-Voting Protocols},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {779--798},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.52},
  doi          = {10.1109/SP.2016.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/CortierGKMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierGKMT16,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  Ralf K{\"{u}}sters and
                  Johannes M{\"{u}}ller and
                  Tomasz Truderung},
  title        = {Verifiability Notions for E-Voting Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/287},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierGKMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/Galindo15,
  author       = {David Galindo},
  title        = {Compact hierarchical identity-based encryption based on a harder decisional
                  problem},
  journal      = {Int. J. Comput. Math.},
  volume       = {92},
  number       = {3},
  pages        = {463--472},
  year         = {2015},
  url          = {https://doi.org/10.1080/00207160.2014.912278},
  doi          = {10.1080/00207160.2014.912278},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/Galindo15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BernhardCGPW15,
  author       = {David Bernhard and
                  V{\'{e}}ronique Cortier and
                  David Galindo and
                  Olivier Pereira and
                  Bogdan Warinschi},
  title        = {SoK: {A} Comprehensive Analysis of Game-Based Ballot Privacy Definitions},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {499--516},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.37},
  doi          = {10.1109/SP.2015.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BernhardCGPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/GalindoGP15,
  author       = {David Galindo and
                  Sandra Guasch and
                  Jordi Puiggali},
  editor       = {Rolf Haenni and
                  Reto E. Koenig and
                  Douglas Wikstr{\"{o}}m},
  title        = {2015 Neuch{\^{a}}tel's Cast-as-Intended Verification Mechanism},
  booktitle    = {E-Voting and Identity - 5th International Conference, VoteID 2015,
                  Bern, Switzerland, September 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9269},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22270-7\_1},
  doi          = {10.1007/978-3-319-22270-7\_1},
  timestamp    = {Thu, 27 Feb 2020 12:57:39 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/GalindoGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardCGPW15,
  author       = {David Bernhard and
                  V{\'{e}}ronique Cortier and
                  David Galindo and
                  Olivier Pereira and
                  Bogdan Warinschi},
  title        = {A comprehensive analysis of game-based ballot privacy definitions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardCGPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierFG15,
  author       = {V{\'{e}}ronique Cortier and
                  Georg Fuchsbauer and
                  David Galindo},
  title        = {BeleniosRF: {A} Strongly Receipt-Free Electronic Voting Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {629},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/629},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GalindoV14,
  author       = {David Galindo and
                  Srinivas Vivek},
  title        = {Limits of a conjecture on a leakage-resilient cryptosystem},
  journal      = {Inf. Process. Lett.},
  volume       = {114},
  number       = {4},
  pages        = {192--196},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ipl.2013.11.014},
  doi          = {10.1016/J.IPL.2013.11.014},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/GalindoV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CortierGGI14,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  St{\'{e}}phane Glondu and
                  Malika Izabach{\`{e}}ne},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Election Verifiability for Helios under Weaker Trust Assumptions},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {327--344},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_19},
  doi          = {10.1007/978-3-319-11212-1\_19},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/CortierGGI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoGLVV14,
  author       = {David Galindo and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Zhe Liu and
                  Praveen Kumar Vadnala and
                  Srinivas Vivek},
  title        = {Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation
                  Mechanism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {835},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/835},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoGLVV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Galindo13,
  author       = {David Galindo},
  title        = {A note on an {IND-CCA2} secure Paillier-based cryptosystem},
  journal      = {Inf. Process. Lett.},
  volume       = {113},
  number       = {22-24},
  pages        = {913--914},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ipl.2013.09.008},
  doi          = {10.1016/J.IPL.2013.09.008},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Galindo13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GalindoV13,
  author       = {David Galindo and
                  Srinivas Vivek},
  editor       = {Martijn Stam},
  title        = {A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature
                  Scheme},
  booktitle    = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC}
                  2013, Oxford, UK, December 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8308},
  pages        = {173--192},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45239-0\_11},
  doi          = {10.1007/978-3-642-45239-0\_11},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/GalindoV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/CortierGGI13,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  St{\'{e}}phane Glondu and
                  Malika Izabach{\`{e}}ne},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Sara Foresti},
  title        = {Distributed ElGamal {\`{a}} la Pedersen: Application to Helios},
  booktitle    = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages        = {131--142},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517840.2517852},
  doi          = {10.1145/2517840.2517852},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/CortierGGI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierGGI13,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  St{\'{e}}phane Glondu and
                  Malika Izabach{\`{e}}ne},
  title        = {A generic construction for voting correctness at minimum cost - Application
                  to Helios},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierGGI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/GalindoRL12,
  author       = {David Galindo and
                  Rodrigo Roman and
                  Javier L{\'{o}}pez},
  title        = {On the energy cost of authenticated key agreement in wireless sensor
                  networks},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {12},
  number       = {1},
  pages        = {133--143},
  year         = {2012},
  url          = {https://doi.org/10.1002/wcm.894},
  doi          = {10.1002/WCM.894},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/GalindoRL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/AlaouiDVGC12,
  author       = {Sidi Mohamed El Yousfi Alaoui and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Pascal V{\'{e}}ron and
                  David Galindo and
                  Pierre{-}Louis Cayrel},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Extended Security Arguments for Signature Schemes},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_2},
  doi          = {10.1007/978-3-642-31410-0\_2},
  timestamp    = {Sun, 02 Jun 2019 21:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/AlaouiDVGC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GalindoHV12,
  author       = {David Galindo and
                  Javier Herranz and
                  Jorge L. Villar},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Identity-Based Encryption with Master Key-Dependent Message Security
                  and Leakage-Resilience},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {627--642},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_36},
  doi          = {10.1007/978-3-642-33167-1\_36},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GalindoHV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GalindoV12,
  author       = {David Galindo and
                  Srinivas Vivek},
  editor       = {Lars R. Knudsen and
                  Huapeng Wu},
  title        = {A Practical Leakage-Resilient Signature Scheme in the Generic Group
                  Model},
  booktitle    = {Selected Areas in Cryptography, 19th International Conference, {SAC}
                  2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7707},
  pages        = {50--65},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35999-6\_4},
  doi          = {10.1007/978-3-642-35999-6\_4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GalindoV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoHV12,
  author       = {David Galindo and
                  Javier Herranz and
                  Jorge Luis Villar},
  title        = {Identity-Based Encryption with Master Key-Dependent Message Security
                  and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoHV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/HoepmanG11,
  author       = {Jaap{-}Henk Hoepman and
                  David Galindo},
  editor       = {Yan Chen and
                  Jaideep Vaidya},
  title        = {Non-interactive distributed encryption: a new primitive for revocable
                  privacy},
  booktitle    = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic
                  society, {WPES} 2011, Chicago, IL, USA, October 17, 2011},
  pages        = {81--92},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046556.2046567},
  doi          = {10.1145/2046556.2046567},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/HoepmanG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/GalindoHK10,
  author       = {David Galindo and
                  Javier Herranz and
                  Eike Kiltz},
  title        = {On the generic construction of identity-based signatures with additional
                  properties},
  journal      = {Adv. Math. Commun.},
  volume       = {4},
  number       = {4},
  pages        = {453--483},
  year         = {2010},
  url          = {https://doi.org/10.3934/amc.2010.4.453},
  doi          = {10.3934/AMC.2010.4.453},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/GalindoHK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GalindoLFFLMS10,
  author       = {David Galindo and
                  Beno{\^{\i}}t Libert and
                  Marc Fischlin and
                  Georg Fuchsbauer and
                  Anja Lehmann and
                  Mark Manulis and
                  Dominique Schr{\"{o}}der},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Public-Key Encryption with Non-Interactive Opening: New Constructions
                  and Stronger Definitions},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {333--350},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_20},
  doi          = {10.1007/978-3-642-12678-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GalindoLFFLMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/Galindo10,
  author       = {David Galindo},
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Chosen-Ciphertext Secure Identity-Based Encryption from Computational
                  Bilinear Diffie-Hellman},
  booktitle    = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  pages        = {367--376},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1\_23},
  doi          = {10.1007/978-3-642-17455-1\_23},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/Galindo10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/KiltzG09,
  author       = {Eike Kiltz and
                  David Galindo},
  title        = {Direct chosen-ciphertext secure identity-based key encapsulation without
                  random oracles},
  journal      = {Theor. Comput. Sci.},
  volume       = {410},
  number       = {47-49},
  pages        = {5093--5111},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.tcs.2009.08.007},
  doi          = {10.1016/J.TCS.2009.08.007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/KiltzG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GalindoG09,
  author       = {David Galindo and
                  Flavio D. Garcia},
  editor       = {Bart Preneel},
  title        = {A Schnorr-Like Lightweight Identity-Based Signature Scheme},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {135--148},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_9},
  doi          = {10.1007/978-3-642-02384-2\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GalindoG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Galindo09,
  author       = {David Galindo},
  editor       = {Marc Fischlin},
  title        = {Breaking and Repairing Damg{\aa}rd et al. Public Key Encryption Scheme
                  with Non-interactive Opening},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {389--398},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_26},
  doi          = {10.1007/978-3-642-00862-7\_26},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Galindo09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0903-0069,
  author       = {Pierre{-}Louis Cayrel and
                  Philippe Gaborit and
                  David Galindo and
                  Marc Girault},
  title        = {Improved identity-based identification using correcting codes},
  journal      = {CoRR},
  volume       = {abs/0903.0069},
  year         = {2009},
  url          = {http://arxiv.org/abs/0903.0069},
  eprinttype    = {arXiv},
  eprint       = {0903.0069},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0903-0069.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GalindoH08,
  author       = {David Galindo and
                  Javier Herranz},
  title        = {On the security of public key cryptosystems with a double decryption
                  mechanism},
  journal      = {Inf. Process. Lett.},
  volume       = {108},
  number       = {5},
  pages        = {279--283},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ipl.2008.05.017},
  doi          = {10.1016/J.IPL.2008.05.017},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/GalindoH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/GalindoMR08,
  author       = {David Galindo and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {Improved certificate-based encryption in the standard model},
  journal      = {J. Syst. Softw.},
  volume       = {81},
  number       = {7},
  pages        = {1218--1226},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jss.2007.09.009},
  doi          = {10.1016/J.JSS.2007.09.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/GalindoMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GalindoRL08,
  author       = {David Galindo and
                  Rodrigo Roman and
                  Javier L{\'{o}}pez},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {A Killer Application for Pairings: Authenticated Key Establishment
                  in Underwater Wireless Sensor Networks},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {120--132},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_9},
  doi          = {10.1007/978-3-540-89641-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/GalindoRL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GalindoGR08,
  author       = {David Galindo and
                  Flavio D. Garcia and
                  Peter van Rossum},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {Computational Soundness of Non-Malleable Commitments},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {361--376},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_26},
  doi          = {10.1007/978-3-540-79104-1\_26},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/GalindoGR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BaekGSZ08,
  author       = {Joonsang Baek and
                  David Galindo and
                  Willy Susilo and
                  Jianying Zhou},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Constructing Strong {KEM} from Weak {KEM} (or How to Revive the {KEM/DEM}
                  Framework)},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {358--374},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_24},
  doi          = {10.1007/978-3-540-85855-3\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BaekGSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KiltzG06,
  author       = {Eike Kiltz and
                  David Galindo},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without
                  Random Oracles},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {336--347},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_28},
  doi          = {10.1007/11780656\_28},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KiltzG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GalindoHK06,
  author       = {David Galindo and
                  Javier Herranz and
                  Eike Kiltz},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {On the Generic Construction of Identity-Based Signatures with Additional
                  Properties},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {178--193},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_12},
  doi          = {10.1007/11935230\_12},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GalindoHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/GalindoMR06,
  author       = {David Galindo and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  editor       = {Andrea S. Atzeni and
                  Antonio Lioy},
  title        = {Breaking Yum and Lee Generic Constructions of Certificate-Less and
                  Certificate-Based Encryption Schemes},
  booktitle    = {Public Key Infrastructure, Third European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4043},
  pages        = {81--91},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11774716\_7},
  doi          = {10.1007/11774716\_7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/GalindoMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GalindoH06,
  author       = {David Galindo and
                  Javier Herranz},
  editor       = {Giovanni Di Crescenzo and
                  Aviel D. Rubin},
  title        = {A Generic Construction for Token-Controlled Public Key Encryption},
  booktitle    = {Financial Cryptography and Data Security, 10th International Conference,
                  {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  pages        = {177--190},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889663\_16},
  doi          = {10.1007/11889663\_16},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GalindoH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/Galindo06,
  author       = {David Galindo},
  editor       = {Marina L. Gavrilova and
                  Osvaldo Gervasi and
                  Vipin Kumar and
                  Chih Jeng Kenneth Tan and
                  David Taniar and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Hyunseung Choo},
  title        = {A Separation Between Selective and Full-Identity Security Notions
                  for Identity-Based Encryption},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2006, International
                  Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3982},
  pages        = {318--326},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11751595\_35},
  doi          = {10.1007/11751595\_35},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/Galindo06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latin/AttrapadungCGHHIM0006,
  author       = {Nuttapong Attrapadung and
                  Yang Cui and
                  David Galindo and
                  Goichiro Hanaoka and
                  Ichiro Hasuo and
                  Hideki Imai and
                  Kanta Matsuura and
                  Peng Yang and
                  Rui Zhang},
  editor       = {Jos{\'{e}} R. Correa and
                  Alejandro Hevia and
                  Marcos A. Kiwi},
  title        = {Relations Among Notions of Security for Identity Based Encryption
                  Schemes},
  booktitle    = {{LATIN} 2006: Theoretical Informatics, 7th Latin American Symposium,
                  Valdivia, Chile, March 20-24, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3887},
  pages        = {130--141},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11682462\_16},
  doi          = {10.1007/11682462\_16},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latin/AttrapadungCGHHIM0006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/CorinGH06,
  author       = {Ricardo Corin and
                  David Galindo and
                  Jaap{-}Henk Hoepman},
  editor       = {Robert Meersman and
                  Zahir Tari and
                  Pilar Herrero},
  title        = {Securing Data Accountability in Decentralized Systems},
  booktitle    = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops,
                  {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS,
                  COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM}
                  Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier,
                  France, October 29 - November 3, 2006. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4277},
  pages        = {626--635},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11915034\_86},
  doi          = {10.1007/11915034\_86},
  timestamp    = {Thu, 14 Oct 2021 10:28:26 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/CorinGH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/GalindoK06,
  author       = {David Galindo and
                  Eike Kiltz},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation
                  Without Random Oracles},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {173--185},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_12},
  doi          = {10.1007/11832072\_12},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/GalindoK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzG06,
  author       = {Eike Kiltz and
                  David Galindo},
  title        = {Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without
                  Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoHK06,
  author       = {David Galindo and
                  Javier Herranz and
                  Eike Kiltz},
  title        = {On the Generic Construction of Identity-Based Signatures with Additional
                  Properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GalindoMMV05,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge Luis Villar},
  title        = {Fujisaki-Okamoto hybrid encryption revisited},
  journal      = {Int. J. Inf. Sec.},
  volume       = {4},
  number       = {4},
  pages        = {228--241},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10207-004-0042-z},
  doi          = {10.1007/S10207-004-0042-Z},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/GalindoMMV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Galindo05,
  author       = {David Galindo},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Boneh-Franklin Identity Based Encryption Revisited},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {791--802},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_64},
  doi          = {10.1007/11523468\_64},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/Galindo05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Galindo05,
  author       = {David Galindo},
  title        = {Boneh-Franklin Identity Based Encryption Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Galindo05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoH05,
  author       = {David Galindo and
                  Ichiro Hasuo},
  title        = {Security Notions for Identity Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/253},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GalindoMTV04,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Tsuyoshi Takagi and
                  Jorge Luis Villar},
  editor       = {Anne Canteaut and
                  Kapalee Viswanathan},
  title        = {A Provably Secure Elliptic Curve Scheme with Fast Encryption},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
                  on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3348},
  pages        = {245--259},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30556-9\_20},
  doi          = {10.1007/978-3-540-30556-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/GalindoMTV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoMV04,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Jorge L. Villar},
  title        = {Evaluating elliptic curve based KEMs in the light of pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoMV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GalindoMMV03,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge Luis Villar},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {Easy Verifiable Primitives and Practical Public Key Cryptosystems},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {69--83},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_6},
  doi          = {10.1007/10958513\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/GalindoMMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/GalindoMMV03,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge L. Villar},
  title        = {An {IND-CPA} cryptosystem from Demytko's primitive},
  booktitle    = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La
                  Sorbonne, Paris, France, 31 March - 4 April, 2003},
  pages        = {167--170},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ITW.2003.1216721},
  doi          = {10.1109/ITW.2003.1216721},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/GalindoMMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GalindoMMV03,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge Luis Villar},
  editor       = {Yvo Desmedt},
  title        = {A Practical Public Key Cryptosystem from Paillier and Rabin Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {279--291},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_21},
  doi          = {10.1007/3-540-36288-6\_21},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GalindoMMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoMMV03,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge L. Villar},
  title        = {Fujisaki-Okamoto {IND-CCA} hybrid encryption revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoMMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoMMV02,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge L. Villar},
  title        = {An efficient semantically secure elliptic curve cryptosystem based
                  on {KMOV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoMMV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoMMV02a,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge L. Villar},
  title        = {A semantically secure elliptic curve {RSA} scheme with small expansion
                  factor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoMMV02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics