Dr Alexander Dent

  1. Article › Research › Peer-reviewed
  2. Published

    Point-weight designs with design conditions on t points

    Dent, A. W., 2008, In: Discrete Mathematics. 308, 11, p. 2080-2093 14 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    The hardness of the DHK problem in the generic group model

    Dent, A. W., 2006, In: Cryptology ePrint Archive: Report. 2006/156

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Wildcarded identity-based encryption

    Abdalla, M., Birkett, J., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G., Schuldt, J. C. N. & Smart, N. P., 2011, In: Journal of Cryptology. 24, 1, p. 42-82

    Research output: Contribution to journalArticlepeer-review

  5. Chapter › Research
  6. Published

    A Brief History of Provably-Secure Public-Key Encryption

    Dent, A. W., 2008, Progress in Cryptology -- Africacrypt 2008. Vaudenay, S. (ed.). Springer-Verlag, p. 357-370 14 p. (Lecture Notes in Computer Science; vol. 5023).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    A Brief Introduction to Certificateless Encryption Schemes and their Infrastructures

    Dent, A. W., 2009, Key Infrastructures – EuroPKI 2009. Martinelli, F. & Preneel, B. (eds.). Springer-Verlag, p. 1-16 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Published

    A Designer's Guide to KEMs

    Dent, A. W., 2003, Cryptography and Coding: 9th IMA International Conference. Paterson, K. G. (ed.). Springer-Verlag, p. 133-151 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    Adapting the weaknesses of the random oracle model to the generic group model

    Dent, A. W., 2002, Advances in Cryptology -- Asiacrypt 2002. Zheng, Y. (ed.). Springer-Verlag, p. 100-109 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    Broadcast Encryption with Multiple Trust Authorities

    Boklan, K. D., Dent, A. W. & Seaman, C. A., 2010, Latincrypt 2010. Abdalla, M. & Baretto, P. S. L. M. (eds.). Springer-Verlag, p. 1-19 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Building better signcryption schemes with Tag-KEMs

    Bjørstad, T. E. & Dent, A. W., 2006, Public Key Cryptography -- PKC 2006. Yung, M., Dodis, Y., Kiayias, A. & Malkin, T. (eds.). Springer-Verlag, p. 491-507 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published

    Certificate management using distributed trusted third parties

    Dent, A. W. & Price, G., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 251-270 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter