Alexander W. Dent Research Papers By Date  By Type  By Subject  BiBTeX








34  A. W. Dent. Choosing Key Sizes for Cryptography. Information Security Technical Report, vol. 15, no. 1, pp. 2127, 2010. [pdf] 
27  A. W. Dent. A Brief History of ProvablySecure Encryption. In, S. Vaudenay, editors, Progress in Cryptology  Africacrypt 2008, LNCS 5023, SpringerVerlag, pp. 357370, 2008. [pdf][slides] 
19  A. W. Dent. Fundamental Problems in Provable Security and Cryptography. Philosophical Transactions of the Royal Society Series A, vol. 364, no. 1, pp. 32153230, 2006. [pdf] 
12  A. W. Dent and C. J. Mitchell. Users Guide to Cryptography and Standards. Artech House, 2005. 
11  A. W. Dent. Proofs of Security for ECIES. In, I. F. Blake, G. Seroussi and N. P. Smart, editors, Advances in Elliptic Curve Cryptography, Oxford University Press, pp. 4166, 2005. 
40  J. Birkett and A. W. Dent. Security Models and Proof Strategies for Plaintext Aware Encryption. Journal of Cryptology, vol. 27, no. 1, pp. 99120, 2014. [pdf] 
26  J. Birkett and A. W. Dent. Relations Among Notions of Plaintext Awareness. In, R. Cramer, editors, Public Key Cryptography  PKC 2008, LNCS 4939, SpringerVerlag, pp. 4764, 2008. [pdf] 
18  A. W. Dent. The CramerShoup Encryption Scheme is Plaintext Aware in the Standard Model. In, S. Vaudenay, editors, Advances in Cryptology  Eurocrypt 2006, LNCS 4004, SpringerVerlag, pp. 289307, 2006. [pdf][slides] 
28  A. Rupp, G. Leander, E. Bangerter, A. W. Dent and A.R. Sadeghi. Sufficient Conditions for Intractability Over BlackBox Groups: Generic Lower Bounds for Generalised DH and DL Problems. In, J. Pieprzyk, editors, Advances in Cryptology  Asiacrypt 2008, LNCS 5350, SpringerVerlag, pp. 489505, 2008. [pdf] 
13  A. W. Dent. The Hardness of the DHK Problem in the Generic Group Model. Cryptology ePprint Archive: Report 2006/156, 2006. [pdf] 
2  A. W. Dent. Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model. In, Y. Zheng, editors, Advances in Cryptology  Asiacrypt 2002, LNCS 2501, SpringerVerlag, pp. 100109, 2002. [pdf][slides] 
39  A. W. Dent. Aggregate Signcryption. Cryptology ePprint Archive: Report 2012/200, 2012. [pdf] 
37  A. W. Dent and Y. Zheng. Practical Signcryption. SpringerVerlag, 2010. 
36  A. W. Dent. Key Establishment Using Signcryption Techniques. In, A. W. Dent and Y. Zheng, editors, Practical Signcryption, SpringerVerlag, pp. 214240, 2010. 
35  A. W. Dent and J. MaloneLee. Signcryption Schemes Based on the RSA Problem. In, A. W. Dent and Y. Zheng, editors, Practical Signcryption, SpringerVerlag, pp. 99120, 2010. 
33  A. W. Dent, M. Fischlin, M. Manulis, M. Stam and D. Schroeder. Confidential Signatures and Deterministic Signcryption. In, P. Q. Nguyen and D. Pointcheval, editors, Public Key Cryptography  PKC 2010, LNCS 6056, SpringerVerlag, pp. 462479, 2010. [pdf] 
15  T. E. Bjorstad and A. W. Dent. Building Better Signcryption Schemes with TagKEMs. In, M. Yung, Y. Dodis, A. Kiayias and T. Malkin, editors, Public Key Cryptography  PKC 2006, LNCS 3958, SpringerVerlag, pp. 491507, 2006. [pdf][slides] 
7  A. W. Dent. Hybrid Signcryption Schemes with Outsider Security. In, J. Zhou, J. Lopez, R. H. Deng and F. Bao, editors, Information Security  ISC 2005, LNCS 3650, SpringerVerlag, pp. 203217, 2005. [pdf][slides] 
6  A. W. Dent. Hybrid Signcryption Schemes with Insider Security. In, C. Boyd and J. M. Gonzalez Nieto, editors, Information Security and Privacy  ACISP 2005, LNCS 3574, SpringerVerlag, pp. 253266, 2005. [pdf][slides] 
31  A. W. Dent. A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures. In, F. Martinelli and B. Preneel, editors, Public Key Infrastructures  EuroPKI 2009, LNCS 6391, SpringerVerlag, pp. 116, 2009. [pdf][slides] 
29  A. W. Dent. A Survey of Certificateless Encryption Schemes and Security Models. International Journal of Information Security, vol. 7, no. 1, pp. 349377, 2008. [pdf] 
25  A. W. Dent, B. Libert and K. G. Paterson. Certificateless Encryption Schemes Strongly Secure in the Standard Model. In, R. Cramer, editors, Public Key Cryptography  PKC 2008, LNCS 4939, SpringerVerlag, pp. 344359, 2008. [pdf][slides] 
38  M. Abdalla, J. Birkett, D. Catalano, A. W. Dent, J. MaloneLee, G. Neven, J. C. N. Schuldt and N. P. Smart. Wildcarded IdentityBased Encryption. Journal of Cryptology, vol. 24, no. 1, pp. 4282, 2011. [pdf] 
32  K. D. Boklan, A. W. Dent and C. A. Seaman. Broadcast Encryption with Multiple Trust Authorities. In, M. Abdalla and S. L. M. Barreto, editors, Progress in Cryptology  Latincrypt 2010, LNCS 6212, SpringerVerlag, pp. 119, 2010. [pdf][slides] 
24  M. Abdalla, A. W. Dent, J. MaloneLee, G. Neven, D. H. Phan and N. P. Smart. IdentityBased Traitor Tracing. In, T. Okamoto and X. Wang, editors, Public Key Cryptography  PKC 2007, LNCS 4450, SpringerVerlag, pp. 458476, 2007. [pdf] 
21  J. Birkett, A. W. Dent, G. Neven and J. C. N. Schuldt. Efficient ChosenCiphertext Secure IdentityBased Encryption with Wildcards. In, J. Pieprzyk, H. Ghodosi and E. Dawson, editors, Information Security and Privacy  ACISP 2007, LNCS 4586, SpringerVerlag, pp. 274292, 2007. [pdf] 
16  M. Abdalla, D. Catalano, A. W. Dent, J. MaloneLee and N. P. Smart. IdentityBased Encryption Gone Wild. In, M. Bugliesi, B. Preneel, V. Sassone and I. Wegener, editors, Automata, Languages and Programming (Volume 2)  ICALP 2006, LNCS 4052, SpringerVerlag, pp. 300311, 2006. [pdf] 
23  T. E. Bjorstad, A. W. Dent and N. P. Smart. Efficient KEMs with Partial Message Recovery. In, S. D. Galbraith, editors, 11th IMA Conference on Coding and Cryptography, LNCS 4887, SpringerVerlag, pp. 233256, 2007. [pdf] 
4  A. W. Dent. A Designer's Guide to KEMs. In, K. G. Paterson, editors, 9th IMA Conference in Coding and Cryptography, LNCS 2898, SpringerVerlag, pp. 133151, 2003. [pdf][slides] 
22  A. W. Dent and Q. Tang. Revisting the Security Model for TimedRelease Encryption with PreOpen Capability. In, J. A. Garay, A. K. Lenstra, M. Mambo and R. Peralta, editors, Information Security  ISC 2007, LNCS 4779, SpringerVerlag, pp. 158174, 2007. [pdf] 
17  A. W. Dent and S. Galbraith. Hidden Pairings and Trapdoor DDH Groups. In, F. Hess, S. Pauli and M. E. Pohst, editors, Algorithmic Number Thoery  ANTS VII, LNCS 4076, SpringerVerlag, pp. 436451, 2006. [pdf][slides] 
14  A. W. Dent. A Note On GameHopping Proofs. Cryptology ePprint Archive: Report 2006/260, 2006. [pdf] 
10  A. W. Dent and G. Price. Certificate Management Using Distributed Trusted Third Parties. In, C. J. Mitchell, editors, Trusted Computing, IEE Press, pp. 251270, 2005. 
9  A. W. Dent. Flaws in an EMail Protocol of Sun, Hsieh and Hwang. IEEE Communications Letters, vol. 9, no. 1, pp. 718719, 2005. [pdf] 
8  A. W. Dent and J. MaloneLee. The Physically Observable Security of Signature Schemes. In, N. P. Smart, editors, 10th IMA Conference in Coding and Cryptography, LNCS 3796, SpringerVerlag, pp. 220232, 2005. [pdf][slides] 
5  A. W. Dent and A. Tomlinson. Regional Blackouts: Protection of Content on 3G Networks. In 5th IEE Conference on 3G Mobile Communication Technologies, IEE Press, pp. 442446, 2004. [pdf][slides] 
3  A. W. Dent. An Implementation Attack Against the EPOC2 PublicKey Cryptosystem. Electronics Letters, vol. 38, no. 1, pp. 412413, 2002. [pdf] 
30  A. W. Dent. PointWeight Designs with Design Conditions on tPoints. Discrete Mathematics, vol. 308, no. 1, pp. 20802093, 2008. [pdf] 
20  P. J. Cameron and A. W. Dent. Orbithomogeneity in Permutation Groups. Bulletin of London Mathematical Society, vol. 38, no. 1, pp. 587596, 2006. [pdf] 
1  A. W. Dent. On The Theory of PointWeight Designs. Ph.D. Thesis, Royal Holloway, University of London, 2001. [pdf] 