Pages that link to "Item:Q3787914"
From MaRDI portal
The following pages link to A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks (Q3787914):
Displayed 45 items.
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems (Q3408192) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs (Q3408212) (← links)
- Merkle tree digital signature and trusted computing platform (Q3443186) (← links)
- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function (Q3503871) (← links)
- Two Notes on the Security of Certificateless Signatures (Q3503872) (← links)
- Formal Security Treatments for Signatures from Identity-Based Encryption (Q3503884) (← links)
- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography (Q3506407) (← links)
- Trapdoor Sanitizable Signatures and Their Application to Content Protection (Q3506413) (← links)
- Digital Signatures Out of Second-Preimage Resistant Hash Functions (Q3535355) (← links)
- Anonymous Proxy Signatures (Q3540046) (← links)
- Proxy Re-signatures in the Standard Model (Q3540149) (← links)
- VSH, an Efficient and Provable Collision-Resistant Hash Function (Q3593095) (← links)
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles (Q3593112) (← links)
- Programmable Hash Functions and Their Applications (Q3600211) (← links)
- Hash Functions from Sigma Protocols and Improvements to VSH (Q3600369) (← links)
- NEW EXTENSIONS OF PAIRING-BASED SIGNATURES INTO UNIVERSAL (MULTI) DESIGNATED VERIFIER SIGNATURES (Q3620617) (← links)
- Divisible On-Line/Off-Line Signatures (Q3623042) (← links)
- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures (Q3627429) (← links)
- Asymmetric Group Key Agreement (Q3627433) (← links)
- Realizing Hash-and-Sign Signatures under Standard Assumptions (Q3627443) (← links)
- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures (Q3631371) (← links)
- Hash function requirements for Schnorr signatures (Q3632752) (← links)
- A designated verifier signature using secret sharing technique (Q3637820) (← links)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks (Q3787914) (← links)
- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) (Q4933219) (← links)
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures (Q5445450) (← links)
- Proxy Signatures Secure Against Proxy Key Exposure (Q5445451) (← links)
- Security of Digital Signature Schemes in Weakened Random Oracle Models (Q5445458) (← links)
- Asymptotically Efficient Lattice-Based Digital Signatures (Q5445497) (← links)
- Equivocal Blind Signatures and Adaptive UC-Security (Q5445514) (← links)
- Faster and Shorter Password-Authenticated Key Exchange (Q5445527) (← links)
- Verifier-Key-Flexible Universal Designated-Verifier Signatures (Q5448551) (← links)
- Proxy Re-signature Schemes Without Random Oracles (Q5458210) (← links)
- A Generic Construction for Universally-Convertible Undeniable Signatures (Q5458491) (← links)
- Efficient ID-Based Digital Signatures with Message Recovery (Q5458495) (← links)
- Threshold RSA for Dynamic and Ad-Hoc Groups (Q5458587) (← links)
- Key Substitution in the Symbolic Analysis of Cryptographic Protocols (Q5458828) (← links)
- Efficient and Short Certificateless Signature (Q5502752) (← links)
- An Efficient On-Line/Off-Line Signature Scheme without Random Oracles (Q5502754) (← links)
- Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme (Q5504550) (← links)
- Round-Optimal Blind Signatures from Waters Signatures (Q5505463) (← links)
- Server-Aided Verification Signatures: Definitions and New Constructions (Q5505465) (← links)
- How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions (Q5505473) (← links)
- The security of the cipher block chaining message authentication code (Q5929912) (← links)