David Galindo
David Galindo
Chief Research Officer, Valory AG
Geverifieerd e-mailadres voor valory.xyz - Homepage
Geciteerd door
Geciteerd door
On the generic construction of identity-based signatures with additional properties
D Galindo, J Herranz, E Kiltz
Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006
Election verifiability for helios under weaker trust assumptions
V Cortier, D Galindo, S Glondu, M Izabachene
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
SoK: A comprehensive analysis of game-based ballot privacy definitions
D Bernhard, V Cortier, D Galindo, O Pereira, B Warinschi
2015 IEEE Symposium on Security and Privacy, 499-516, 2015
Sok: Verifiability notions for e-voting protocols
V Cortier, D Galindo, R Küsters, J Müller, T Truderung
2016 IEEE Symposium on Security and Privacy (SP), 779-798, 2016
A schnorr-like lightweight identity-based signature scheme
D Galindo, F Garcia
Progress in Cryptology–AFRICACRYPT 2009, 135-148, 2009
BeleniosRF: A non-interactive receipt-free electronic voting scheme
P Chaidos, V Cortier, G Fuchsbauer, D Galindo
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Boneh-Franklin identity based encryption revisited
D Galindo
Automata, Languages and Programming: 32nd International Colloquium, ICALP …, 2005
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
E Kiltz, D Galindo
Information Security and Privacy: 11th Australasian Conference, ACISP 2006 …, 2006
Improved certificate-based encryption in the standard model
D Galindo, P Morillo, C Ràfols
Journal of Systems and Software 81 (7), 1218-1226, 2008
Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes
D Galindo, P Morillo, C Ràfols
Public Key Infrastructure: Third European PKI Workshop: Theory and Practice …, 2006
2015 Neuchâtel’s cast-as-intended verification mechanism
D Galindo, S Guasch, J Puiggali
E-Voting and Identity: 5th International Conference, VoteID 2015, Bern …, 2015
Extended security arguments for signature schemes
Ö Dagdelen, D Galindo, P Véron, SM El Yousfi Alaoui, PL Cayrel
Designs, Codes and Cryptography 78 (2), 441-461, 2016
Distributed elgamal á la pedersen: application to helios
V Cortier, D Galindo, S Glondu, M Izabachene
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013
A Practical Leakage-Resilient Signature Scheme in the Generic Group Model.
D Galindo, S Vivek
Selected Areas in Cryptography, 50-65, 2012
A killer application for pairings: Authenticated key establishment in underwater wireless sensor networks
D Galindo, R Roman, J Lopez
Cryptology and Network Security: 7th International Conference, CANS 2008 …, 2008
Identity-based encryption with master key-dependent message security and leakage-resilience
D Galindo, J Herranz, J Villar
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
E Kiltz, D Galindo
Theoretical Computer Science 410 (47-49), 5093-5111, 2009
A formal analysis of the Neuchâtel e-voting protocol
V Cortier, D Galindo, M Turuani
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 430-442, 2018
Implementation of a leakage-resilient ElGamal key encapsulation mechanism
D Galindo, J Großschädl, Z Liu, PK Vadnala, S Vivek
Journal of Cryptographic Engineering 6, 229-238, 2016
Public-key encryption with non-interactive opening: New constructions and stronger definitions
D Galindo, B Libert, M Fischlin, G Fuchsbauer, A Lehmann, M Manulis, ...
Progress in Cryptology–AFRICACRYPT 2010: Third International Conference on …, 2010
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20