33 |
A. W. Dent, M. Fischlin, M. Manulis, M. Stam and D. Schroeder. Confidential Signatures and Deterministic Signcryption. In, P. Q. Nguyen and D. Pointcheval, editors, Public Key Cryptography -- PKC 2010, LNCS 6056, Springer-Verlag, pp. 462-479, 2010. [pdf] |
32 |
K. D. Boklan, A. W. Dent and C. A. Seaman. Broadcast Encryption with Multiple Trust Authorities. In, M. Abdalla and S. L. M. Barreto, editors, Progress in Cryptology -- Latincrypt 2010, LNCS 6212, Springer-Verlag, pp. 1-19, 2010. [pdf][slides] |
31 |
A. W. Dent. A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures. In, F. Martinelli and B. Preneel, editors, Public Key Infrastructures -- EuroPKI 2009, LNCS 6391, Springer-Verlag, pp. 1-16, 2009. [pdf][slides] |
28 |
A. Rupp, G. Leander, E. Bangerter, A. W. Dent and A.-R. Sadeghi. Sufficient Conditions for Intractability Over Black-Box Groups: Generic Lower Bounds for Generalised DH and DL Problems. In, J. Pieprzyk, editors, Advances in Cryptology -- Asiacrypt 2008, LNCS 5350, Springer-Verlag, pp. 489-505, 2008. [pdf] |
27 |
A. W. Dent. A Brief History of Provably-Secure Encryption. In, S. Vaudenay, editors, Progress in Cryptology -- Africacrypt 2008, LNCS 5023, Springer-Verlag, pp. 357-370, 2008. [pdf][slides] |
26 |
J. Birkett and A. W. Dent. Relations Among Notions of Plaintext Awareness. In, R. Cramer, editors, Public Key Cryptography -- PKC 2008, LNCS 4939, Springer-Verlag, pp. 47-64, 2008. [pdf] |
25 |
A. W. Dent, B. Libert and K. G. Paterson. Certificateless Encryption Schemes Strongly Secure in the Standard Model. In, R. Cramer, editors, Public Key Cryptography -- PKC 2008, LNCS 4939, Springer-Verlag, pp. 344-359, 2008. [pdf][slides] |
24 |
M. Abdalla, A. W. Dent, J. Malone-Lee, G. Neven, D. H. Phan and N. P. Smart. Identity-Based Traitor Tracing. In, T. Okamoto and X. Wang, editors, Public Key Cryptography -- PKC 2007, LNCS 4450, Springer-Verlag, pp. 458-476, 2007. [pdf] |
23 |
T. E. Bjorstad, A. W. Dent and N. P. Smart. Efficient KEMs with Partial Message Recovery. In, S. D. Galbraith, editors, 11th IMA Conference on Coding and Cryptography, LNCS 4887, Springer-Verlag, pp. 233-256, 2007. [pdf] |
22 |
A. W. Dent and Q. Tang. Revisting the Security Model for Timed-Release Encryption with Pre-Open Capability. In, J. A. Garay, A. K. Lenstra, M. Mambo and R. Peralta, editors, Information Security -- ISC 2007, LNCS 4779, Springer-Verlag, pp. 158-174, 2007. [pdf] |
21 |
J. Birkett, A. W. Dent, G. Neven and J. C. N. Schuldt. Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. In, J. Pieprzyk, H. Ghodosi and E. Dawson, editors, Information Security and Privacy -- ACISP 2007, LNCS 4586, Springer-Verlag, pp. 274-292, 2007. [pdf] |
18 |
A. W. Dent. The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model. In, S. Vaudenay, editors, Advances in Cryptology -- Eurocrypt 2006, LNCS 4004, Springer-Verlag, pp. 289-307, 2006. [pdf][slides] |
17 |
A. W. Dent and S. Galbraith. Hidden Pairings and Trapdoor DDH Groups. In, F. Hess, S. Pauli and M. E. Pohst, editors, Algorithmic Number Thoery -- ANTS VII, LNCS 4076, Springer-Verlag, pp. 436-451, 2006. [pdf][slides] |
16 |
M. Abdalla, D. Catalano, A. W. Dent, J. Malone-Lee and N. P. Smart. Identity-Based Encryption Gone Wild. In, M. Bugliesi, B. Preneel, V. Sassone and I. Wegener, editors, Automata, Languages and Programming (Volume 2) -- ICALP 2006, LNCS 4052, Springer-Verlag, pp. 300-311, 2006. [pdf] |
15 |
T. E. Bjorstad and A. W. Dent. Building Better Signcryption Schemes with Tag-KEMs. In, M. Yung, Y. Dodis, A. Kiayias and T. Malkin, editors, Public Key Cryptography -- PKC 2006, LNCS 3958, Springer-Verlag, pp. 491-507, 2006. [pdf][slides] |
8 |
A. W. Dent and J. Malone-Lee. The Physically Observable Security of Signature Schemes. In, N. P. Smart, editors, 10th IMA Conference in Coding and Cryptography, LNCS 3796, Springer-Verlag, pp. 220-232, 2005. [pdf][slides] |
7 |
A. W. Dent. Hybrid Signcryption Schemes with Outsider Security. In, J. Zhou, J. Lopez, R. H. Deng and F. Bao, editors, Information Security -- ISC 2005, LNCS 3650, Springer-Verlag, pp. 203-217, 2005. [pdf][slides] |
6 |
A. W. Dent. Hybrid Signcryption Schemes with Insider Security. In, C. Boyd and J. M. Gonzalez Nieto, editors, Information Security and Privacy -- ACISP 2005, LNCS 3574, Springer-Verlag, pp. 253-266, 2005. [pdf][slides] |
5 |
A. W. Dent and A. Tomlinson. Regional Blackouts: Protection of Content on 3G Networks. In 5th IEE Conference on 3G Mobile Communication Technologies, IEE Press, pp. 442-446, 2004. [pdf][slides] |
4 |
A. W. Dent. A Designer's Guide to KEMs. In, K. G. Paterson, editors, 9th IMA Conference in Coding and Cryptography, LNCS 2898, Springer-Verlag, pp. 133-151, 2003. [pdf][slides] |
2 |
A. W. Dent. Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model. In, Y. Zheng, editors, Advances in Cryptology -- Asiacrypt 2002, LNCS 2501, Springer-Verlag, pp. 100-109, 2002. [pdf][slides] |