John Malone-Lee

According to our database1, John Malone-Lee authored at least 21 papers between 2002 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Wildcarded Identity-Based Encryption.
J. Cryptol., 2011

2010
Signcryption Schemes Based on the RSA Problem.
Proceedings of the Practical Signcryption, 2010

Obfuscation for Cryptographic Purposes.
J. Cryptol., 2010

2008
Generic Constructions of Identity-Based and Certificateless KEMs.
J. Cryptol., 2008

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
J. Cryptol., 2008

2007
Identity-Based Traitor Tracing.
Proceedings of the Public Key Cryptography, 2007

2006
Identity-Based Encryption Gone Wild.
IACR Cryptol. ePrint Arch., 2006

2005
An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction.
IACR Cryptol. ePrint Arch., 2005

Signcryption with Non-interactive Non-repudiation.
Des. Codes Cryptogr., 2005

A General Construction for Simultaneous Signing and Encrypting.
Proceedings of the Cryptography and Coding, 2005

The Physically Observable Security of Signature Schemes.
Proceedings of the Cryptography and Coding, 2005

2004
On the security of signature schemes and signcryption schemes.
PhD thesis, 2004

Secure Computation of the Mean and Related Statistics.
IACR Cryptol. ePrint Arch., 2004

Improved Identity-Based Signcryption.
IACR Cryptol. ePrint Arch., 2004

Escrow-Free Encryption Supporting Cryptographic Workflow.
IACR Cryptol. ePrint Arch., 2004

2003
A General Construction of IND-CCA2 Secure Public Key Encryption.
Proceedings of the Cryptography and Coding, 2003

Two Birds One Stone: Signcryption Using RSA.
Proceedings of the Topics in Cryptology, 2003

2002
Public key signatures in the multi-user setting.
Inf. Process. Lett., 2002

Identity-Based Signcryption.
IACR Cryptol. ePrint Arch., 2002

Modifications of ECDSA.
Proceedings of the Selected Areas in Cryptography, 2002

Flaws in Applying Proof Methodologies to Signature Schemes.
Proceedings of the Advances in Cryptology, 2002


  Loading...