Pages that link to "Item:Q3787914"
From MaRDI portal
The following pages link to A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks (Q3787914):
Displayed 50 items.
- Security of 2t-Root Identification and Signatures (Q3452348) (← links)
- Robust and Efficient Sharing of RSA Functions (Q3452349) (← links)
- New Generation of Secure and Practical RSA-Based Signatures (Q3452350) (← links)
- Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing (Q3452352) (← links)
- On Fast and Provably Secure Message Authentication Based on Universal Hashing (Q3452360) (← links)
- (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond (Q3457067) (← links)
- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function (Q3503871) (← links)
- Two Notes on the Security of Certificateless Signatures (Q3503872) (← links)
- Formal Security Treatments for Signatures from Identity-Based Encryption (Q3503884) (← links)
- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography (Q3506407) (← links)
- Trapdoor Sanitizable Signatures and Their Application to Content Protection (Q3506413) (← links)
- Digital Signatures Out of Second-Preimage Resistant Hash Functions (Q3535355) (← links)
- Anonymous Proxy Signatures (Q3540046) (← links)
- Proxy Re-signatures in the Standard Model (Q3540149) (← links)
- VSH, an Efficient and Provable Collision-Resistant Hash Function (Q3593095) (← links)
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles (Q3593112) (← links)
- Programmable Hash Functions and Their Applications (Q3600211) (← links)
- Hash Functions from Sigma Protocols and Improvements to VSH (Q3600369) (← links)
- NEW EXTENSIONS OF PAIRING-BASED SIGNATURES INTO UNIVERSAL (MULTI) DESIGNATED VERIFIER SIGNATURES (Q3620617) (← links)
- Divisible On-Line/Off-Line Signatures (Q3623042) (← links)
- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures (Q3627429) (← links)
- Asymmetric Group Key Agreement (Q3627433) (← links)
- Realizing Hash-and-Sign Signatures under Standard Assumptions (Q3627443) (← links)
- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures (Q3631371) (← links)
- Hash function requirements for Schnorr signatures (Q3632752) (← links)
- A designated verifier signature using secret sharing technique (Q3637820) (← links)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks (Q3787914) (← links)
- Grid-Obstacle Representations with Connections to Staircase Guarding (Q4625102) (← links)
- Drawing Bobbin Lace Graphs, or, Fundamental Cycles for a Subclass of Periodic Graphs (Q4625107) (← links)
- MMH: Software message authentication in the Gbit/second rates (Q4639339) (← links)
- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) (Q4933219) (← links)
- Threshold-directed signature scheme based on hybrid number theoretic problems (Q4985420) (← links)
- How to Use Indistinguishability Obfuscation: Deniable Encryption, and More (Q4989921) (← links)
- Symmetric Authentication within a Simulatable Cryptographic Library (Q5030211) (← links)
- An efficient and secure identity based multiple signatures scheme based on RSA (Q5036735) (← links)
- Witness Maps and Applications (Q5041158) (← links)
- LegRoast: Efficient Post-quantum Signatures from the Legendre PRF (Q5041218) (← links)
- UC Updatable Databases and Applications (Q5048962) (← links)
- Message-Restriction-Free Commitment Scheme Based on Lattice Assumption (Q5095924) (← links)
- Ring Trapdoor Redactable Signatures from Lattice (Q5095930) (← links)
- A Novel Certificateless Multi-signature Scheme over NTRU Lattices (Q5095936) (← links)
- Unconditional Byzantine agreement for any number of faulty processors (Q5096793) (← links)
- Communication efficient Zero-knowledge Proofs of knowledge (Q5096802) (← links)
- Cryptography and cryptographic protocols (Q5138490) (← links)
- Delegation of cryptographic servers for capture-resilient devices (Q5138499) (← links)
- Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations (Q5149756) (← links)
- Атаки на схемы электронной подписи, не учитываемые традиционными определениями стойкости, и меры противодействия им (Q5152416) (← links)
- Finding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments (Q5252662) (← links)
- Quantum blind signature with an offline repository (Q5258466) (← links)
- Adaptive Partitioning (Q5270372) (← links)