dblp.uni-trier.dewww.uni-trier.de

Nuttapong Attrapadung

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
12EEJun Furukawa, Nuttapong Attrapadung, Ryuichi Sakai, Goichiro Hanaoka: A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low. INDOCRYPT 2008: 116-129
11EETakahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions. IEICE Transactions 91-D(5): 1466-1476 (2008)
2007
10EEJun Furukawa, Nuttapong Attrapadung: Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys. ICALP 2007: 496-508
9EETakahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. ProvSec 2007: 68-84
8EENuttapong Attrapadung, Hideki Imai: Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure. IEICE Transactions 90-A(1): 187-203 (2007)
7EENuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Efficient Identity-Based Encryption with Tight Security Reduction. IEICE Transactions 90-A(9): 1803-1813 (2007)
2006
6EENuttapong Attrapadung, Jun Furukawa, Hideki Imai: Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. ASIACRYPT 2006: 161-177
5EENuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Efficient Identity-Based Encryption with Tight Security Reduction. CANS 2006: 19-36
4EENuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang: Relations Among Notions of Security for Identity Based Encryption Schemes. LATIN 2006: 130-141
2005
3EENuttapong Attrapadung, Hideki Imai: Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations. ASIACRYPT 2005: 100-120
2003
2EENuttapong Attrapadung, Kazukuni Kobara, Hideki Imai: Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. ASIACRYPT 2003: 374-391
1EENuttapong Attrapadung, Kazukuni Kobara, Hideki Imai: Broadcast encryption with short keys and transmissions. Digital Rights Management Workshop 2003: 55-66

Coauthor Index

1Yang Cui [4]
2Jun Furukawa [5] [6] [7] [10] [12]
3David Galindo [4]
4Takeshi Gomi [5] [7]
5Goichiro Hanaoka [4] [5] [7] [9] [11] [12]
6Ichiro Hasuo [4]
7Hideki Imai [1] [2] [3] [4] [5] [6] [7] [8] [9] [11]
8Kazukuni Kobara [1] [2]
9Takahiro Matsuda [9] [11]
10Kanta Matsuura [4] [9] [11]
11Ryuichi Sakai [12]
12Peng Yang [4]
13Rui Zhang [4] [5] [7]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)