Cryptology ePrint Archive: Report 2005/224

Available versions in chronological order


An Efficient ID-KEM Based On The Sakai--Kasahara Key Construction
L. Chen and Z. Cheng and J. Malone--Lee and N.P. Smart

An Efficient ID-KEM Based On The Sakai--Kasahara Key Construction
L. Chen and Z. Cheng and J. Malone--Lee and N.P. Smart

An Efficient ID-KEM Based On The Sakai--Kasahara Key Construction
L. Chen and Z. Cheng and J. Malone--Lee and N.P. Smart

An Efficient ID-KEM Based On The Sakai--Kasahara Key Construction
L. Chen and Z. Cheng and J. Malone--Lee and N.P. Smart

An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction
L. Chen and Z. Cheng and J. Malone-Lee and N.P. Smart
Publication Info: IEE Proceedings, Information Security


[ Cryptology ePrint archive ]