Pages that link to "Item:Q3787914"
From MaRDI portal
The following pages link to A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks (Q3787914):
Displayed 44 items.
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures (Q5445450) (← links)
- Proxy Signatures Secure Against Proxy Key Exposure (Q5445451) (← links)
- Security of Digital Signature Schemes in Weakened Random Oracle Models (Q5445458) (← links)
- Asymptotically Efficient Lattice-Based Digital Signatures (Q5445497) (← links)
- Equivocal Blind Signatures and Adaptive UC-Security (Q5445514) (← links)
- Faster and Shorter Password-Authenticated Key Exchange (Q5445527) (← links)
- Verifier-Key-Flexible Universal Designated-Verifier Signatures (Q5448551) (← links)
- Proxy Re-signature Schemes Without Random Oracles (Q5458210) (← links)
- A Generic Construction for Universally-Convertible Undeniable Signatures (Q5458491) (← links)
- Efficient ID-Based Digital Signatures with Message Recovery (Q5458495) (← links)
- Threshold RSA for Dynamic and Ad-Hoc Groups (Q5458587) (← links)
- Key Substitution in the Symbolic Analysis of Cryptographic Protocols (Q5458828) (← links)
- Efficient and Short Certificateless Signature (Q5502752) (← links)
- An Efficient On-Line/Off-Line Signature Scheme without Random Oracles (Q5502754) (← links)
- Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme (Q5504550) (← links)
- Round-Optimal Blind Signatures from Waters Signatures (Q5505463) (← links)
- Server-Aided Verification Signatures: Definitions and New Constructions (Q5505465) (← links)
- How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions (Q5505473) (← links)
- Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures (Q5738754) (← links)
- Chameleon-Hashes with Ephemeral Trapdoors (Q5738755) (← links)
- Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash (Q5738783) (← links)
- On the security of some variants of the RSA signature scheme (Q5862294) (← links)
- The security of the cipher block chaining message authentication code (Q5929912) (← links)
- Digital Signatures with Memory-Tight Security in the Multi-challenge Setting (Q6041292) (← links)
- An efficient identity-based signature scheme with provable security (Q6066147) (← links)
- Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA (Q6070760) (← links)
- Security analysis of RSA-BSSA (Q6070761) (← links)
- Locally verifiable signature and key aggregation (Q6104358) (← links)
- Enhanced Security of Attribute-Based Signatures (Q6104623) (← links)
- Protean Signature Schemes (Q6104624) (← links)
- A Generic Framework for Accountable Optimistic Fair Exchange Protocol (Q6108621) (← links)
- Half-aggregation of Schnorr signatures with tight reductions (Q6109444) (← links)
- Attribute based tracing for securing group signatures against centralized authorities (Q6111600) (← links)
- Lattice-based signatures with tight adaptive corruptions and more (Q6113962) (← links)
- On the impossibility of algebraic vector commitments in pairing-free groups (Q6114273) (← links)
- Identity-based matchmaking encryption from standard assumptions (Q6135441) (← links)
- The power of undirected rewindings for adaptive security (Q6145931) (← links)
- A New Design of Online/Offline Signatures Based on Lattice (Q6163661) (← links)
- Auditable asymmetric password authenticated public key establishment (Q6164398) (← links)
- Better than advertised security for non-interactive threshold signatures (Q6166964) (← links)
- Public key encryption with hierarchical authorized keyword search (Q6176059) (← links)
- Masking the GLP lattice-based signature scheme at any order (Q6182002) (← links)
- Fully adaptive Schnorr threshold signatures (Q6186608) (← links)
- Factorization, malleability and equivalent problems (Q6196945) (← links)