Cryptology ePrint Archive: Report 2005/224
Available versions in chronological order
20050712:201518 (posted 12-Jul-2005 20:15:18 UTC)
An Efficient ID-KEM Based On The Sakai--Kasahara Key Construction
L. Chen and Z. Cheng and J. Malone--Lee and N.P. Smart
20050713:072943 (posted 13-Jul-2005 07:29:43 UTC)
An Efficient ID-KEM Based On The Sakai--Kasahara Key Construction
L. Chen and Z. Cheng and J. Malone--Lee and N.P. Smart
20050915:085257 (posted 15-Sep-2005 08:52:57 UTC)
An Efficient ID-KEM Based On The Sakai--Kasahara Key Construction
L. Chen and Z. Cheng and J. Malone--Lee and N.P. Smart
20050915:104618 (posted 15-Sep-2005 10:46:18 UTC)
An Efficient ID-KEM Based On The Sakai--Kasahara Key Construction
L. Chen and Z. Cheng and J. Malone--Lee and N.P. Smart
20060117:135310 (posted 17-Jan-2006 13:53:10 UTC)
An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction
L. Chen and Z. Cheng and J. Malone-Lee and N.P. Smart
Publication Info: IEE Proceedings, Information Security
[
Cryptology ePrint archive
]