V. Benjumea, S. Choi, J. Lopez, and M. Yung. Cryptology and Network Security, volume 4856 of Lecture Notes in Computer Science, page 265-281. Springer, (2007)
T. Diament, H. Lee, A. Keromytis, and M. Yung. ACM Conference on Computer and Communications Security, page 330-343. ACM, (2004)Dual Receiver Encryption
provable security under Random Oracle Model.
E. Brickell, D. Pointcheval, S. Vaudenay, and M. Yung. Third International Workshop on Practice and Theory in Public Key
Cryptosystems, PKC 2000, volume 1751 of Lecture Notes in Computer Science, page 276--292. Springer, (2000)
A. Kiayias, Y. Tsiounis, and M. Yung. Advances in Cryptology -- EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, page 571-589. Springer, (2004)
J. Katz, R. Ostrovsky, and M. Yung. Advances in Cryptology -- EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, page 475--494. Springer, (2001)
J. Katz, R. Ostrovsky, and M. Yung. Security in Communication Networks: Third International Conference,
SCN 2002, volume 2576 of Lecture Notes in Computer Science, page 29--44. Springer, (2003)