Programmable hash functions and their applications (Q434345): Difference between revisions

From MaRDI portal
Changed an Item
Import241208061232 (talk | contribs)
Normalize DOI.
 
(6 intermediate revisions by 5 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s00145-011-9102-5 / rank
Normal rank
 
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-011-9102-5 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3029670809 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q59163693 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption Gone Wild / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Lattice (H)IBE in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Exact Security of Digital Signatures-How to Sign with RSA and Rabin / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940698 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signatures on Randomizable Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short signatures without random oracles and the SDH assumption in bilinear groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption from the Weil Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474196 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short signatures from the Weil pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: General Ad Hoc Encryption from Exponent Inversion IBE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4414288 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bonsai Trees, or How to Delegate a Lattice Basis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3792628 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035740 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Analysis of the Strong Diffie-Hellman Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Practical and Tightly Secure Signature Scheme Without Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536804 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737249 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Generic Insecurity of the Full Domain Hash / rank
 
Normal rank
Property / cites work
 
Property / cites work: Zero-knowledge proofs of identity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5538132 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Cramer-Shoup Strong-RSA Signature Scheme Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364540 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Hash-and-Sign Signatures Without the Random Oracle / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Pseudorandom Generator from any One-way Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Hybrid Encryption from Weakened Key Encapsulation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Chosen Ciphertext Secure Encryption from Factoring / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short and Stateless Signatures from the RSA Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4327751 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How (not) to design strong-RSA signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Direct chosen-ciphertext secure identity-based key encapsulation without random oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Authentication from Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asymptotically Efficient Lattice-Based Digital Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy trapdoor functions and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight Proofs for Signature Schemes without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5316395 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / DBLP publication ID
 
Property / DBLP publication ID: journals/joc/HofheinzK12 / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S00145-011-9102-5 / rank
 
Normal rank

Latest revision as of 17:26, 9 December 2024

scientific article
Language Label Description Also known as
English
Programmable hash functions and their applications
scientific article

    Statements

    Programmable hash functions and their applications (English)
    0 references
    0 references
    0 references
    10 July 2012
    0 references
    programmable hash functions
    0 references
    digital signature
    0 references
    standard model
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers