David Galindo
Orcid: 0000-0003-3563-5551Affiliations:
- University of Birmingham, UK
According to our database1,
David Galindo
authored at least 65 papers
between 2002 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Distributed Ledger Technol. Res. Pract., 2023
2022
2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
2020
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Information Security - 23rd International Conference, 2020
2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019
2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2016
J. Cryptogr. Eng., 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Int. J. Comput. Math., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the E-Voting and Identity - 5th International Conference, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
2014
Inf. Process. Lett., 2014
Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
A generic construction for voting correctness at minimum cost - Application to Helios.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
2012
Wirel. Commun. Mob. Comput., 2012
Identity-Based Encryption with Master Key-Dependent Message Security and Applications.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience.
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
2010
Adv. Math. Commun., 2010
Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Proceedings of the Progress in Cryptology, 2010
2009
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles.
Theor. Comput. Sci., 2009
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening.
Proceedings of the Topics in Cryptology, 2009
Proceedings of the Progress in Cryptology, 2009
2008
Inf. Process. Lett., 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Information Security Practice and Experience, 2008
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2006
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the LATIN 2006: Theoretical Informatics, 2006
A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes.
Proceedings of the Public Key Infrastructure, 2006
2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Progress in Cryptology, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Proceedings of the Information Security, 6th International Conference, 2003
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002