Pages that link to "Item:Q3787914"
From MaRDI portal
The following pages link to A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks (Q3787914):
Displayed 50 items.
- How (not) to design strong-RSA signatures (Q2430687) (← links)
- Security weaknesses in arbitrated quantum signature protocols (Q2443972) (← links)
- A provably secure short signature scheme based on discrete logarithms (Q2456500) (← links)
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks (Q2456502) (← links)
- Hybrid proxy multisignature: a new type multi-party signature (Q2465334) (← links)
- Towards a theory of data entanglement (Q2465624) (← links)
- New \((t, n)\) threshold directed signature scheme with provable security (Q2466072) (← links)
- Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs (Q2481774) (← links)
- Cryptanalysis of ISO/IEC 9796-1 (Q2482334) (← links)
- Breaking and fixing public-key Kerberos (Q2482453) (← links)
- Fine-grained forward-secure signature schemes without random oracles (Q2489913) (← links)
- Cryptanalysis of some signature schemes with message recovery (Q2572002) (← links)
- Generic groups, collision resistance, and ECDSA (Q2572964) (← links)
- Signcryption with non-interactive non-repudiation (Q2572979) (← links)
- Authenticated broadcast with a partially compromised public-key infrastructure (Q2637312) (← links)
- A strong designated verifier signature scheme tightly related to the LRSW assumption (Q2868163) (← links)
- Short Transitive Signatures for Directed Trees (Q2889993) (← links)
- Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More (Q2890012) (← links)
- Applications of Signcryption (Q3000039) (← links)
- On the Security of the Winternitz One-Time Signature Scheme (Q3011927) (← links)
- Adaptively Secure Non-interactive Threshold Cryptosystems (Q3012950) (← links)
- Security of signature schemes in the presence of key-dependent messages (Q3075869) (← links)
- One-Time Signatures and Chameleon Hash Functions (Q3084263) (← links)
- On Security Preserving Reductions – Revised Terminology (Q3088200) (← links)
- Cryptographic Verification by Typing for a Sample Protocol Implementation (Q3092172) (← links)
- On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack (Q3102784) (← links)
- XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions (Q3102787) (← links)
- Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes (Q3104713) (← links)
- Provable security of digital signatures in the tamper-proof device model (Q3184555) (← links)
- Security of Verifiably Encrypted Signatures and a Construction without Random Oracles (Q3392898) (← links)
- Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures (Q3392908) (← links)
- Universally Composable Adaptive Priced Oblivious Transfer (Q3392915) (← links)
- A Storage Efficient Redactable Signature in the Standard Model (Q3399214) (← links)
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems (Q3408192) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs (Q3408212) (← links)
- Merkle tree digital signature and trusted computing platform (Q3443186) (← links)
- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function (Q3503871) (← links)
- Two Notes on the Security of Certificateless Signatures (Q3503872) (← links)
- Formal Security Treatments for Signatures from Identity-Based Encryption (Q3503884) (← links)
- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography (Q3506407) (← links)
- Trapdoor Sanitizable Signatures and Their Application to Content Protection (Q3506413) (← links)
- Digital Signatures Out of Second-Preimage Resistant Hash Functions (Q3535355) (← links)
- Anonymous Proxy Signatures (Q3540046) (← links)
- Proxy Re-signatures in the Standard Model (Q3540149) (← links)
- VSH, an Efficient and Provable Collision-Resistant Hash Function (Q3593095) (← links)
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles (Q3593112) (← links)
- Programmable Hash Functions and Their Applications (Q3600211) (← links)
- Hash Functions from Sigma Protocols and Improvements to VSH (Q3600369) (← links)
- NEW EXTENSIONS OF PAIRING-BASED SIGNATURES INTO UNIVERSAL (MULTI) DESIGNATED VERIFIER SIGNATURES (Q3620617) (← links)