Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: David Galindo
@article{DBLP:journals/distribledger/0008L0G0023, author = {Qin Wang and Rujia Li and Qi Wang and David Galindo and Shiping Chen and Yang Xiang}, title = {Transparent Registration-Based Encryption through Blockchain}, journal = {Distributed Ledger Technol. Res. Pract.}, volume = {2}, number = {1}, pages = {3:1--3:14}, year = {2023}, url = {https://doi.org/10.1145/3568315}, doi = {10.1145/3568315}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/distribledger/0008L0G0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/LiWWGR22, author = {Rujia Li and Qin Wang and Qi Wang and David Galindo and Mark Ryan}, title = {SoK: TEE-Assisted Confidential Smart Contract}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {3}, pages = {711--731}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0093}, doi = {10.56553/POPETS-2022-0093}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/LiWWGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GalindoL22, author = {David Galindo and Jia Liu}, editor = {Steven D. Galbraith}, title = {Robust Subgroup Multi-signatures for Consensus}, booktitle = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13161}, pages = {537--561}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-95312-6\_22}, doi = {10.1007/978-3-030-95312-6\_22}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/GalindoL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-08699, author = {Rujia Li and Qin Wang and Qi Wang and David Galindo}, title = {How Do Smart Contracts Benefit Security Protocols?}, journal = {CoRR}, volume = {abs/2202.08699}, year = {2022}, url = {https://arxiv.org/abs/2202.08699}, eprinttype = {arXiv}, eprint = {2202.08699}, timestamp = {Mon, 23 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-08699.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-08548, author = {Rujia Li and Qin Wang and Qi Wang and David Galindo and Mark Ryan}, title = {SoK: TEE-assisted Confidential Smart Contract}, journal = {CoRR}, volume = {abs/2203.08548}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.08548}, doi = {10.48550/ARXIV.2203.08548}, eprinttype = {arXiv}, eprint = {2203.08548}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-08548.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/GalindoLOW21, author = {David Galindo and Jia Liu and Mihai Ordean and Jin{-}Mann Wong}, title = {Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {88--102}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00017}, doi = {10.1109/EUROSP51992.2021.00017}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/GalindoLOW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbc2/LiWZWGX21, author = {Rujia Li and Qin Wang and Xinrui Zhang and Qi Wang and David Galindo and Yang Xiang}, title = {An Offline Delegatable Cryptocurrency System}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2021, Sydney, Australia, May 3-6, 2021}, pages = {1--9}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICBC51069.2021.9461112}, doi = {10.1109/ICBC51069.2021.9461112}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icbc2/LiWZWGX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-12905, author = {Rujia Li and Qin Wang and Xinrui Zhang and Qi Wang and David Galindo and Yang Xiang}, title = {An Offline Delegatable Cryptocurrency System}, journal = {CoRR}, volume = {abs/2103.12905}, year = {2021}, url = {https://arxiv.org/abs/2103.12905}, eprinttype = {arXiv}, eprint = {2103.12905}, timestamp = {Mon, 23 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-12905.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-12456, author = {David Galindo and Jia Liu and Chris McMahon Stone and Mihai Ordean}, title = {SoK: Untangling File-based Encryption on Mobile Devices}, journal = {CoRR}, volume = {abs/2111.12456}, year = {2021}, url = {https://arxiv.org/abs/2111.12456}, eprinttype = {arXiv}, eprint = {2111.12456}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-12456.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LiWL0G20, author = {Rujia Li and Qin Wang and Feng Liu and Qi Wang and David Galindo}, editor = {Willy Susilo and Robert H. Deng and Fuchun Guo and Yannan Li and Rolly Intan}, title = {An Accountable Decryption System Based on Privacy-Preserving Smart Contracts}, booktitle = {Information Security - 23rd International Conference, {ISC} 2020, Bali, Indonesia, December 16-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12472}, pages = {372--390}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62974-8\_21}, doi = {10.1007/978-3-030-62974-8\_21}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/LiWL0G20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-05390, author = {Marcin Abram and David Galindo and Daniel Honerkamp and Jonathan Ward and Jin{-}Mann Wong}, title = {Democratising blockchain: {A} minimal agency consensus model}, journal = {CoRR}, volume = {abs/2006.05390}, year = {2020}, url = {https://arxiv.org/abs/2006.05390}, eprinttype = {arXiv}, eprint = {2006.05390}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-05390.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoLOW20, author = {David Galindo and Jia Liu and Mihai Ordean and Jin{-}Mann Wong}, title = {Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2020}, url = {https://eprint.iacr.org/2020/096}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoLOW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoL20, author = {David Galindo and Jia Liu}, title = {Robust Subgroup Multi-Signatures for Consensus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1478}, year = {2020}, url = {https://eprint.iacr.org/2020/1478}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GalindoL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiGW19, author = {Rujia Li and David Galindo and Qi Wang}, editor = {Cristina P{\'{e}}rez{-}Sol{\`{a}} and Guillermo Navarro{-}Arribas and Alex Biryukov and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2019 International Workshops, {DPM} 2019 and {CBT} 2019, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11737}, pages = {355--371}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31500-9\_23}, doi = {10.1007/978-3-030-31500-9\_23}, timestamp = {Mon, 05 Feb 2024 20:29:40 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LiGW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Ordean0G19, author = {Mihai Ordean and Mark Ryan and David Galindo}, editor = {Florian Kerschbaum and Atefeh Mashatan and Jianwei Niu and Adam J. Lee}, title = {{CAOS:} Concurrent-Access Obfuscated Store}, booktitle = {Proceedings of the 24th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019}, pages = {13--24}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3322431.3325101}, doi = {10.1145/3322431.3325101}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Ordean0G19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-02443, author = {Rujia Li and David Galindo and Qi Wang}, title = {Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts}, journal = {CoRR}, volume = {abs/1908.02443}, year = {2019}, url = {http://arxiv.org/abs/1908.02443}, eprinttype = {arXiv}, eprint = {1908.02443}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-02443.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/CortierGT18, author = {V{\'{e}}ronique Cortier and David Galindo and Mathieu Turuani}, title = {A Formal Analysis of the Neuchatel e-Voting Protocol}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {430--442}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00037}, doi = {10.1109/EUROSP.2018.00037}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/CortierGT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-10412, author = {Mihai Ordean and Mark Ryan and David Galindo}, title = {{CAOS:} Concurrent-Access Obfuscated Store}, journal = {CoRR}, volume = {abs/1709.10412}, year = {2017}, url = {http://arxiv.org/abs/1709.10412}, eprinttype = {arXiv}, eprint = {1709.10412}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-10412.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DagdelenGVAC16, author = {{\"{O}}zg{\"{u}}r Dagdelen and David Galindo and Pascal V{\'{e}}ron and Sidi Mohamed El Yousfi Alaoui and Pierre{-}Louis Cayrel}, title = {Extended security arguments for signature schemes}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {441--461}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0009-7}, doi = {10.1007/S10623-014-0009-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DagdelenGVAC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GalindoG0VV16, author = {David Galindo and Johann Gro{\ss}sch{\"{a}}dl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek}, title = {Implementation of a leakage-resilient ElGamal key encapsulation mechanism}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {3}, pages = {229--238}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0121-x}, doi = {10.1007/S13389-016-0121-X}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/GalindoG0VV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChaidosCFG16, author = {Pyrros Chaidos and V{\'{e}}ronique Cortier and Georg Fuchsbauer and David Galindo}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {BeleniosRF: {A} Non-interactive Receipt-Free Electronic Voting Scheme}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1614--1625}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978337}, doi = {10.1145/2976749.2978337}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChaidosCFG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/CucurullGG16, author = {Jordi Cucurull and Sandra Guasch and David Galindo}, editor = {Mohammad S. Obaidat}, title = {A Javascript Voting Client for Remote Online Voting}, booktitle = {E-Business and Telecommunications - 13th International Joint Conference, {ICETE} 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {764}, pages = {266--290}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-67876-4\_13}, doi = {10.1007/978-3-319-67876-4\_13}, timestamp = {Mon, 21 Jan 2019 11:20:27 +0100}, biburl = {https://dblp.org/rec/conf/icete/CucurullGG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CucurullGG16, author = {Jordi Cucurull and Sandra Guasch and David Galindo}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Transitioning to a Javascript Voting Client for Remote Online Voting}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {121--132}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005967301210132}, doi = {10.5220/0005967301210132}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CucurullGG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CortierGKMT16, author = {V{\'{e}}ronique Cortier and David Galindo and Ralf K{\"{u}}sters and Johannes M{\"{u}}ller and Tomasz Truderung}, title = {SoK: Verifiability Notions for E-Voting Protocols}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {779--798}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.52}, doi = {10.1109/SP.2016.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/CortierGKMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierGKMT16, author = {V{\'{e}}ronique Cortier and David Galindo and Ralf K{\"{u}}sters and Johannes M{\"{u}}ller and Tomasz Truderung}, title = {Verifiability Notions for E-Voting Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2016}, url = {http://eprint.iacr.org/2016/287}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CortierGKMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/Galindo15, author = {David Galindo}, title = {Compact hierarchical identity-based encryption based on a harder decisional problem}, journal = {Int. J. Comput. Math.}, volume = {92}, number = {3}, pages = {463--472}, year = {2015}, url = {https://doi.org/10.1080/00207160.2014.912278}, doi = {10.1080/00207160.2014.912278}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/Galindo15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BernhardCGPW15, author = {David Bernhard and V{\'{e}}ronique Cortier and David Galindo and Olivier Pereira and Bogdan Warinschi}, title = {SoK: {A} Comprehensive Analysis of Game-Based Ballot Privacy Definitions}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {499--516}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.37}, doi = {10.1109/SP.2015.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BernhardCGPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/GalindoGP15, author = {David Galindo and Sandra Guasch and Jordi Puiggali}, editor = {Rolf Haenni and Reto E. Koenig and Douglas Wikstr{\"{o}}m}, title = {2015 Neuch{\^{a}}tel's Cast-as-Intended Verification Mechanism}, booktitle = {E-Voting and Identity - 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9269}, pages = {3--18}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22270-7\_1}, doi = {10.1007/978-3-319-22270-7\_1}, timestamp = {Thu, 27 Feb 2020 12:57:39 +0100}, biburl = {https://dblp.org/rec/conf/voteid/GalindoGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardCGPW15, author = {David Bernhard and V{\'{e}}ronique Cortier and David Galindo and Olivier Pereira and Bogdan Warinschi}, title = {A comprehensive analysis of game-based ballot privacy definitions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2015}, url = {http://eprint.iacr.org/2015/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardCGPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierFG15, author = {V{\'{e}}ronique Cortier and Georg Fuchsbauer and David Galindo}, title = {BeleniosRF: {A} Strongly Receipt-Free Electronic Voting Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {629}, year = {2015}, url = {http://eprint.iacr.org/2015/629}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/GalindoV14, author = {David Galindo and Srinivas Vivek}, title = {Limits of a conjecture on a leakage-resilient cryptosystem}, journal = {Inf. Process. Lett.}, volume = {114}, number = {4}, pages = {192--196}, year = {2014}, url = {https://doi.org/10.1016/j.ipl.2013.11.014}, doi = {10.1016/J.IPL.2013.11.014}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/GalindoV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CortierGGI14, author = {V{\'{e}}ronique Cortier and David Galindo and St{\'{e}}phane Glondu and Malika Izabach{\`{e}}ne}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Election Verifiability for Helios under Weaker Trust Assumptions}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {327--344}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_19}, doi = {10.1007/978-3-319-11212-1\_19}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/CortierGGI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoGLVV14, author = {David Galindo and Johann Gro{\ss}sch{\"{a}}dl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek}, title = {Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {835}, year = {2014}, url = {http://eprint.iacr.org/2014/835}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GalindoGLVV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Galindo13, author = {David Galindo}, title = {A note on an {IND-CCA2} secure Paillier-based cryptosystem}, journal = {Inf. Process. Lett.}, volume = {113}, number = {22-24}, pages = {913--914}, year = {2013}, url = {https://doi.org/10.1016/j.ipl.2013.09.008}, doi = {10.1016/J.IPL.2013.09.008}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Galindo13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/GalindoV13, author = {David Galindo and Srinivas Vivek}, editor = {Martijn Stam}, title = {A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme}, booktitle = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC} 2013, Oxford, UK, December 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8308}, pages = {173--192}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45239-0\_11}, doi = {10.1007/978-3-642-45239-0\_11}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/GalindoV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/CortierGGI13, author = {V{\'{e}}ronique Cortier and David Galindo and St{\'{e}}phane Glondu and Malika Izabach{\`{e}}ne}, editor = {Ahmad{-}Reza Sadeghi and Sara Foresti}, title = {Distributed ElGamal {\`{a}} la Pedersen: Application to Helios}, booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2013, Berlin, Germany, November 4, 2013}, pages = {131--142}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517840.2517852}, doi = {10.1145/2517840.2517852}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/CortierGGI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierGGI13, author = {V{\'{e}}ronique Cortier and David Galindo and St{\'{e}}phane Glondu and Malika Izabach{\`{e}}ne}, title = {A generic construction for voting correctness at minimum cost - Application to Helios}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2013}, url = {http://eprint.iacr.org/2013/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierGGI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/GalindoRL12, author = {David Galindo and Rodrigo Roman and Javier L{\'{o}}pez}, title = {On the energy cost of authenticated key agreement in wireless sensor networks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {12}, number = {1}, pages = {133--143}, year = {2012}, url = {https://doi.org/10.1002/wcm.894}, doi = {10.1002/WCM.894}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/GalindoRL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/AlaouiDVGC12, author = {Sidi Mohamed El Yousfi Alaoui and {\"{O}}zg{\"{u}}r Dagdelen and Pascal V{\'{e}}ron and David Galindo and Pierre{-}Louis Cayrel}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Extended Security Arguments for Signature Schemes}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {19--34}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_2}, doi = {10.1007/978-3-642-31410-0\_2}, timestamp = {Sun, 02 Jun 2019 21:14:37 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/AlaouiDVGC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GalindoHV12, author = {David Galindo and Javier Herranz and Jorge L. Villar}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {627--642}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_36}, doi = {10.1007/978-3-642-33167-1\_36}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GalindoHV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GalindoV12, author = {David Galindo and Srinivas Vivek}, editor = {Lars R. Knudsen and Huapeng Wu}, title = {A Practical Leakage-Resilient Signature Scheme in the Generic Group Model}, booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC} 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7707}, pages = {50--65}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35999-6\_4}, doi = {10.1007/978-3-642-35999-6\_4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/GalindoV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoHV12, author = {David Galindo and Javier Herranz and Jorge Luis Villar}, title = {Identity-Based Encryption with Master Key-Dependent Message Security and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2012}, url = {http://eprint.iacr.org/2012/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoHV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/HoepmanG11, author = {Jaap{-}Henk Hoepman and David Galindo}, editor = {Yan Chen and Jaideep Vaidya}, title = {Non-interactive distributed encryption: a new primitive for revocable privacy}, booktitle = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic society, {WPES} 2011, Chicago, IL, USA, October 17, 2011}, pages = {81--92}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046556.2046567}, doi = {10.1145/2046556.2046567}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/HoepmanG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/GalindoHK10, author = {David Galindo and Javier Herranz and Eike Kiltz}, title = {On the generic construction of identity-based signatures with additional properties}, journal = {Adv. Math. Commun.}, volume = {4}, number = {4}, pages = {453--483}, year = {2010}, url = {https://doi.org/10.3934/amc.2010.4.453}, doi = {10.3934/AMC.2010.4.453}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/GalindoHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GalindoLFFLMS10, author = {David Galindo and Beno{\^{\i}}t Libert and Marc Fischlin and Georg Fuchsbauer and Anja Lehmann and Mark Manulis and Dominique Schr{\"{o}}der}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {333--350}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_20}, doi = {10.1007/978-3-642-12678-9\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/GalindoLFFLMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/Galindo10, author = {David Galindo}, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman}, booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, pages = {367--376}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1\_23}, doi = {10.1007/978-3-642-17455-1\_23}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/Galindo10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/KiltzG09, author = {Eike Kiltz and David Galindo}, title = {Direct chosen-ciphertext secure identity-based key encapsulation without random oracles}, journal = {Theor. Comput. Sci.}, volume = {410}, number = {47-49}, pages = {5093--5111}, year = {2009}, url = {https://doi.org/10.1016/j.tcs.2009.08.007}, doi = {10.1016/J.TCS.2009.08.007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/KiltzG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GalindoG09, author = {David Galindo and Flavio D. Garcia}, editor = {Bart Preneel}, title = {A Schnorr-Like Lightweight Identity-Based Signature Scheme}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {135--148}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_9}, doi = {10.1007/978-3-642-02384-2\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/GalindoG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Galindo09, author = {David Galindo}, editor = {Marc Fischlin}, title = {Breaking and Repairing Damg{\aa}rd et al. Public Key Encryption Scheme with Non-interactive Opening}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {389--398}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_26}, doi = {10.1007/978-3-642-00862-7\_26}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Galindo09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0903-0069, author = {Pierre{-}Louis Cayrel and Philippe Gaborit and David Galindo and Marc Girault}, title = {Improved identity-based identification using correcting codes}, journal = {CoRR}, volume = {abs/0903.0069}, year = {2009}, url = {http://arxiv.org/abs/0903.0069}, eprinttype = {arXiv}, eprint = {0903.0069}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0903-0069.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/GalindoH08, author = {David Galindo and Javier Herranz}, title = {On the security of public key cryptosystems with a double decryption mechanism}, journal = {Inf. Process. Lett.}, volume = {108}, number = {5}, pages = {279--283}, year = {2008}, url = {https://doi.org/10.1016/j.ipl.2008.05.017}, doi = {10.1016/J.IPL.2008.05.017}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/GalindoH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/GalindoMR08, author = {David Galindo and Paz Morillo and Carla R{\`{a}}fols}, title = {Improved certificate-based encryption in the standard model}, journal = {J. Syst. Softw.}, volume = {81}, number = {7}, pages = {1218--1226}, year = {2008}, url = {https://doi.org/10.1016/j.jss.2007.09.009}, doi = {10.1016/J.JSS.2007.09.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/GalindoMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GalindoRL08, author = {David Galindo and Rodrigo Roman and Javier L{\'{o}}pez}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {120--132}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_9}, doi = {10.1007/978-3-540-89641-8\_9}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/GalindoRL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/GalindoGR08, author = {David Galindo and Flavio D. Garcia and Peter van Rossum}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {Computational Soundness of Non-Malleable Commitments}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {361--376}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_26}, doi = {10.1007/978-3-540-79104-1\_26}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/GalindoGR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BaekGSZ08, author = {Joonsang Baek and David Galindo and Willy Susilo and Jianying Zhou}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Constructing Strong {KEM} from Weak {KEM} (or How to Revive the {KEM/DEM} Framework)}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {358--374}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_24}, doi = {10.1007/978-3-540-85855-3\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BaekGSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KiltzG06, author = {Eike Kiltz and David Galindo}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {336--347}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_28}, doi = {10.1007/11780656\_28}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KiltzG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GalindoHK06, author = {David Galindo and Javier Herranz and Eike Kiltz}, editor = {Xuejia Lai and Kefei Chen}, title = {On the Generic Construction of Identity-Based Signatures with Additional Properties}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {178--193}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_12}, doi = {10.1007/11935230\_12}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GalindoHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/GalindoMR06, author = {David Galindo and Paz Morillo and Carla R{\`{a}}fols}, editor = {Andrea S. Atzeni and Antonio Lioy}, title = {Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes}, booktitle = {Public Key Infrastructure, Third European {PKI} Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4043}, pages = {81--91}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11774716\_7}, doi = {10.1007/11774716\_7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/GalindoMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GalindoH06, author = {David Galindo and Javier Herranz}, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {A Generic Construction for Token-Controlled Public Key Encryption}, booktitle = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, pages = {177--190}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889663\_16}, doi = {10.1007/11889663\_16}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GalindoH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/Galindo06, author = {David Galindo}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3982}, pages = {318--326}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751595\_35}, doi = {10.1007/11751595\_35}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/Galindo06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latin/AttrapadungCGHHIM0006, author = {Nuttapong Attrapadung and Yang Cui and David Galindo and Goichiro Hanaoka and Ichiro Hasuo and Hideki Imai and Kanta Matsuura and Peng Yang and Rui Zhang}, editor = {Jos{\'{e}} R. Correa and Alejandro Hevia and Marcos A. Kiwi}, title = {Relations Among Notions of Security for Identity Based Encryption Schemes}, booktitle = {{LATIN} 2006: Theoretical Informatics, 7th Latin American Symposium, Valdivia, Chile, March 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3887}, pages = {130--141}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11682462\_16}, doi = {10.1007/11682462\_16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latin/AttrapadungCGHHIM0006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/CorinGH06, author = {Ricardo Corin and David Galindo and Jaap{-}Henk Hoepman}, editor = {Robert Meersman and Zahir Tari and Pilar Herrero}, title = {Securing Data Accountability in Decentralized Systems}, booktitle = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops, {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM} Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4277}, pages = {626--635}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11915034\_86}, doi = {10.1007/11915034\_86}, timestamp = {Thu, 14 Oct 2021 10:28:26 +0200}, biburl = {https://dblp.org/rec/conf/otm/CorinGH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/GalindoK06, author = {David Galindo and Eike Kiltz}, editor = {Roberto De Prisco and Moti Yung}, title = {Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {173--185}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_12}, doi = {10.1007/11832072\_12}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/GalindoK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzG06, author = {Eike Kiltz and David Galindo}, title = {Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2006}, url = {http://eprint.iacr.org/2006/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoHK06, author = {David Galindo and Javier Herranz and Eike Kiltz}, title = {On the Generic Construction of Identity-Based Signatures with Additional Properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2006}, url = {http://eprint.iacr.org/2006/296}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GalindoMMV05, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge Luis Villar}, title = {Fujisaki-Okamoto hybrid encryption revisited}, journal = {Int. J. Inf. Sec.}, volume = {4}, number = {4}, pages = {228--241}, year = {2005}, url = {https://doi.org/10.1007/s10207-004-0042-z}, doi = {10.1007/S10207-004-0042-Z}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/GalindoMMV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/Galindo05, author = {David Galindo}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Boneh-Franklin Identity Based Encryption Revisited}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {791--802}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_64}, doi = {10.1007/11523468\_64}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/Galindo05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Galindo05, author = {David Galindo}, title = {Boneh-Franklin Identity Based Encryption Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2005}, url = {http://eprint.iacr.org/2005/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Galindo05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoH05, author = {David Galindo and Ichiro Hasuo}, title = {Security Notions for Identity Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2005}, url = {http://eprint.iacr.org/2005/253}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GalindoMTV04, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Tsuyoshi Takagi and Jorge Luis Villar}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {A Provably Secure Elliptic Curve Scheme with Fast Encryption}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {245--259}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_20}, doi = {10.1007/978-3-540-30556-9\_20}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GalindoMTV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoMV04, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Jorge L. Villar}, title = {Evaluating elliptic curve based KEMs in the light of pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2004}, url = {http://eprint.iacr.org/2004/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoMV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GalindoMMV03, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge Luis Villar}, editor = {Colin Boyd and Wenbo Mao}, title = {Easy Verifiable Primitives and Practical Public Key Cryptosystems}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {69--83}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_6}, doi = {10.1007/10958513\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/GalindoMMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/GalindoMMV03, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge L. Villar}, title = {An {IND-CPA} cryptosystem from Demytko's primitive}, booktitle = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La Sorbonne, Paris, France, 31 March - 4 April, 2003}, pages = {167--170}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ITW.2003.1216721}, doi = {10.1109/ITW.2003.1216721}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/GalindoMMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GalindoMMV03, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge Luis Villar}, editor = {Yvo Desmedt}, title = {A Practical Public Key Cryptosystem from Paillier and Rabin Schemes}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {279--291}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_21}, doi = {10.1007/3-540-36288-6\_21}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GalindoMMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoMMV03, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge L. Villar}, title = {Fujisaki-Okamoto {IND-CCA} hybrid encryption revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2003}, url = {http://eprint.iacr.org/2003/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoMMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoMMV02, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge L. Villar}, title = {An efficient semantically secure elliptic curve cryptosystem based on {KMOV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2002}, url = {http://eprint.iacr.org/2002/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoMMV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoMMV02a, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge L. Villar}, title = {A semantically secure elliptic curve {RSA} scheme with small expansion factor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2002}, url = {http://eprint.iacr.org/2002/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoMMV02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.