Author of the publication

Efficient Identity-Based Encryption with Tight Security Reduction.

, , , , , and . CANS, volume 4301 of Lecture Notes in Computer Science, page 19-36. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Attrapadung, Nuttapong
add a person with the name Attrapadung, Nuttapong
 

Other publications of authors with the same name

Oblivious Linear Group Actions and Applications., , , , , , , and . CCS, page 630-650. ACM, (2021)Time-Specific Encryption from Forward-Secure Encryption., , , , , and . SCN, volume 7485 of Lecture Notes in Computer Science, page 184-204. Springer, (2012)Broadcast encryption with short keys and transmissions., , and . Digital Rights Management Workshop, page 55-66. ACM, (2003)A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List., , , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 419-437. Springer, (2014)Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations., and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 100-120. Springer, (2005)Conjunctive Broadcast and Attribute-Based Encryption., and . Pairing, volume 5671 of Lecture Notes in Computer Science, page 248-265. Springer, (2009)A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption., , , and . Public Key Cryptography, volume 8383 of Lecture Notes in Computer Science, page 275-292. Springer, (2014)Attribute-Based Signatures for Circuits from Bilinear Map., , and . Public Key Cryptography (1), volume 9614 of Lecture Notes in Computer Science, page 283-300. Springer, (2016)Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation., , , , , , , and . CoRR, (2021)A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function., , , , and . ProvSec, volume 4784 of Lecture Notes in Computer Science, page 68-84. Springer, (2007)