Cryptographers' World
 

Willy Susilo


Author's Web Page Link

27 papers in database with 622 citations StarStar

H-number: 11

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Thomas Plantard,  Willy Susilo,  Broadcast Attacks against Lattice-Based Cryptosystems, pp. 456 - 472, ACNS 2009.

[Electronic Edition][Cited 2 times ]

2. Joonsang Baek,  Willy Susilo,  Joseph K. Liu,  Jianying Zhou,  A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack, pp. 143 - 155, ACNS 2009.

[Electronic Edition][No citation]

3. Qianhong Wu,  Yi Mu,  Willy Susilo,  Bo Qin,  Josep Domingo-Ferrer,  Asymmetric Group Key Agreement, pp. 153 - 170, EUROCRYPT 2009.

[Electronic Edition][Cited 9 times ]

4. Mohammad Reza Reyhanitabar,  Willy Susilo,  Yi Mu,  Enhanced Target Collision Resistant Hash Functions Revisited, pp. 327 - 344, FSE 2009.

[Electronic Edition][Cited 3 times ]

5. Qiong Huang,  Guomin Yang,  Duncan S. Wong,  Willy Susilo,  Ambiguous Optimistic Fair Exchange, pp. 74 - 89, ASIACRYPT 2008.

[Electronic Edition][Cited 7 times ]

6. Man Ho Au,  Qiong Huang,  Joseph K. Liu,  Willy Susilo,  Duncan S. Wong,  Guomin Yang,  Traceable and Retrievable Identity-Based Encryption, pp. 94 - 110, ACNS 2008.

[Electronic Edition][Cited 6 times ]

7. Qiong Huang,  Guomin Yang,  Duncan S. Wong,  Willy Susilo,  Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles, pp. 106 - 120, CT-RSA 2008.

[Electronic Edition][Cited 8 times ]

8. Thomas Plantard,  Willy Susilo,  Khin Than Win,  A Digital Signature Scheme Based on CVP, pp. 288 - 307, PKC 2008.

[Electronic Edition][No citation]

9. Xiaofeng Chen,  Fangguo Zhang,  Willy Susilo,  Yi Mu,  Efficient Generic On-Line/Off-Line Signatures Without Key Exposure, pp. 18 - 30, ACNS 2007.

[Electronic Edition][Cited 20 times ]

10. Liang Lu,  Reihaneh Safavi-Naini,  Jeffrey Horton,  Willy Susilo,  An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme, pp. 65 - 86, ACNS 2007.

[Electronic Edition][Cited 1 times ]

11. Man Ho Au,  Qianhong Wu,  Willy Susilo,  Yi Mu,  Compact E-Cash from Bounded Accumulator, pp. 178 - 195, CT-RSA 2007.

[Electronic Edition][Cited 16 times ]

12. Huafei Zhu,  Willy Susilo,  Yi Mu,  Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures, pp. 134 - 149, PKC 2007.

[Electronic Edition][Cited 5 times ]

13. Man Ho Au,  Joseph K. Liu,  Willy Susilo,  Tsz Hon Yuen,  Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature, pp. 364 - 378, INDOCRYPT 2006.

[Electronic Edition][Cited 11 times ]

14. Sherman S. M. Chow,  Willy Susilo,  Tsz Hon Yuen,  Escrowed Linkability of Ring Signatures and Its Applications, pp. 175 - 192, VIETCRYPT 2006.

[Electronic Edition][Cited 10 times ]

15. Jianyong Huang,  Jennifer Seberry,  Willy Susilo,  On the Internal Structure of Alpha-MAC, pp. 271 - 285, VIETCRYPT 2006.

[Electronic Edition][Cited 6 times ]

16. Fangguo Zhang,  Xiaofeng Chen,  Willy Susilo,  Yi Mu,  A New Signature Scheme Without Random Oracles from Bilinear Pairings, pp. 67 - 80, VIETCRYPT 2006.

[Electronic Edition][Cited 9 times ]

17. Xiaofeng Chen,  Fangguo Zhang,  Yi Mu,  Willy Susilo,  Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings, pp. 251 - 265, FC 2006.

[Electronic Edition][Cited 13 times ]

18. Man Ho Au,  Sherman S. M. Chow,  Willy Susilo,  Short E-Cash, pp. 332 - 346, INDOCRYPT 2005.

[Electronic Edition][Cited 13 times ]

19. Joonsang Baek,  Reihaneh Safavi-Naini,  Willy Susilo,  Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature), pp. 644 - 661, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 30 times ]

20. Fangguo Zhang,  Willy Susilo,  Yi Mu,  Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures), pp. 45 - 56, FC 2005.

[Electronic Edition][Cited 17 times ]

21. Joonsang Baek,  Reihaneh Safavi-Naini,  Willy Susilo,  Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption, pp. 380 - 397, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 52 times Red Star]

22. Willy Susilo,  Yi Mu,  Deniable Ring Authentication Revisited, pp. 149 - 163, ACNS 2004.

[Electronic Edition][Cited 21 times ]

23. Nathan Curtis,  Reihaneh Safavi-Naini,  Willy Susilo,   X 2Rep: Enhanced Trust Semantics for the XRep Protocol, pp. 205 - 219, ACNS 2004.

[Electronic Edition][Cited 14 times ]

24. Fangguo Zhang,  Reihaneh Safavi-Naini,  Willy Susilo,  An Efficient Signature Scheme from Bilinear Pairings and Its Applications, pp. 277 - 290, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 255 times Red StarRed StarRed Star]

25. Yi Mu,  Willy Susilo,  Yan-Xia Lin,  Identity-Based Broadcasting, pp. 177 - 190, INDOCRYPT 2003.

[Electronic Edition][Cited 6 times ]

26. Fangguo Zhang,  Reihaneh Safavi-Naini,  Willy Susilo,  Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings, pp. 191 - 204, INDOCRYPT 2003.

[Electronic Edition][Cited 84 times Red Star]

27. Reihaneh Safavi-Naini,  Willy Susilo,  Huaxiong Wang,  Fail-Stop Signature for Long Messages, pp. 165 - 177, INDOCRYPT 2000.

[Electronic Edition][Cited 4 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...