Black-box constructions of signature schemes in the bounded leakage setting (Q781055): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Simultaneous Hardcore Bits and Cryptography against Memory Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - ASIACRYPT 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security proofs for identity-based identification and signature schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption from the Weil Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography - PKC 2006 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully leakage-resilient signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Certificateless threshold ring signature / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Identity-Based Signature from Gap Diffie-Hellman Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502796 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Certificateless undeniable signature scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signature schemes secure against hard-to-invert leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Practical Leakage-Resilient Signature Scheme in the Generic Group Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical ID-Based Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413870 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Certificateless signature: a new security model and an improved generic construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Transformation to Strongly Unforgeable Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Certificateless Signature Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signature Schemes with Bounded Leakage Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Achieving Leakage Resilience through Dual System Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signatures Resilient to Continual Leakage on Memory and Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4788557 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient certificateless proxy signature scheme with provable security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3601892 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Certificateless threshold signature scheme from bilinear maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Leakage-Resilient Signatures with Auxiliary Inputs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Applied Cryptography and Network Security / rank
 
Normal rank

Revision as of 02:28, 23 July 2024

scientific article
Language Label Description Also known as
English
Black-box constructions of signature schemes in the bounded leakage setting
scientific article

    Statements

    Black-box constructions of signature schemes in the bounded leakage setting (English)
    0 references
    0 references
    0 references
    16 July 2020
    0 references
    identity-based signature
    0 references
    certificateless signature
    0 references
    black-box construction
    0 references
    bounded leakage model
    0 references
    leakage-resilient cryptography
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers