Another Look at Tightness (Q2889878): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: Poly1305-AES / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-28496-0_18 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2104071065 / rank
 
Normal rank
Property / cites work
 
Property / cites work: RSA and Rabin Functions: Certain Parts are as Hard as the Whole / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374913 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Keying Hash Functions for Message Authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341751 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Exact Security of Digital Signatures-How to Sign with RSA and Rabin / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proving Tight Security for Rabin-Williams Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Time-Memory Trade-Offs with Multiple Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707396 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536802 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key agreement protocols and their security analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Simple Unpredictable Pseudo-Random Number Generator / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption from the Weil Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434890 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A tapestry of identity-based encryption: practical frameworks compared / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778861 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography and Coding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536804 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737250 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A “proof-reading” of Some Issues in Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: History-Free Aggregate Message Authentication Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical Identity Based Encryption with Polynomially Many Levels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364542 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A cryptanalytic time-memory trade-off / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Applications of Time Memory Data Tradeoffs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Designated Verifier Proofs and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Aggregate Message Authentication Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Another look at ``provable security'' / rank
 
Normal rank
Property / cites work
 
Property / cites work: Another Look at “Provable Security”. II / rank
 
Normal rank
Property / cites work
 
Property / cites work: HMQV: A High-Performance Secure Diffie-Hellman Protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418525 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stronger Security of Authenticated Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sequential Aggregate Signatures and Multisignatures Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4871218 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology - INDOCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of signature schemes in a multi-user setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security arguments for digital signatures and blind signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Provable-Security Treatment of the Key-Wrap Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweakable enciphering schemes using only the encryption function of a block cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight Proofs for Signature Schemes without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient signature generation by smart cards / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography and Coding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallel collision search with cryptanalytic applications / rank
 
Normal rank

Latest revision as of 08:17, 5 July 2024

scientific article
Language Label Description Also known as
English
Another Look at Tightness
scientific article

    Statements

    Another Look at Tightness (English)
    0 references
    0 references
    0 references
    0 references
    8 June 2012
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references