Pages that link to "Item:Q3787914"
From MaRDI portal
The following pages link to A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks (Q3787914):
Displayed 50 items.
- On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings (Q2829956) (← links)
- A strong designated verifier signature scheme tightly related to the LRSW assumption (Q2868163) (← links)
- Short Transitive Signatures for Directed Trees (Q2889993) (← links)
- Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More (Q2890012) (← links)
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy (Q2947523) (← links)
- From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures (Q2953775) (← links)
- Adaptive Oblivious Transfer and Generalization (Q2953778) (← links)
- From Identification to Signatures, Tightly: A Framework and Generic Transforms (Q2953785) (← links)
- One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model (Q2980868) (← links)
- Applications of Signcryption (Q3000039) (← links)
- On the Security of the Winternitz One-Time Signature Scheme (Q3011927) (← links)
- Adaptively Secure Non-interactive Threshold Cryptosystems (Q3012950) (← links)
- Security of signature schemes in the presence of key-dependent messages (Q3075869) (← links)
- One-Time Signatures and Chameleon Hash Functions (Q3084263) (← links)
- On Security Preserving Reductions – Revised Terminology (Q3088200) (← links)
- Cryptographic Verification by Typing for a Sample Protocol Implementation (Q3092172) (← links)
- On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack (Q3102784) (← links)
- XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions (Q3102787) (← links)
- Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes (Q3104713) (← links)
- Adaptive Succinct Garbled RAM or: How to Delegate Your Database (Q3181022) (← links)
- Provable security of digital signatures in the tamper-proof device model (Q3184555) (← links)
- Authentic Quantum Nonces (Q3296712) (← links)
- Security of Verifiably Encrypted Signatures and a Construction without Random Oracles (Q3392898) (← links)
- Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures (Q3392908) (← links)
- Universally Composable Adaptive Priced Oblivious Transfer (Q3392915) (← links)
- A Storage Efficient Redactable Signature in the Standard Model (Q3399214) (← links)
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems (Q3408192) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs (Q3408212) (← links)
- Merkle tree digital signature and trusted computing platform (Q3443186) (← links)
- Anonymous Communication and Anonymous Cash (Q3452339) (← links)
- Security of 2t-Root Identification and Signatures (Q3452348) (← links)
- Robust and Efficient Sharing of RSA Functions (Q3452349) (← links)
- New Generation of Secure and Practical RSA-Based Signatures (Q3452350) (← links)
- Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing (Q3452352) (← links)
- On Fast and Provably Secure Message Authentication Based on Universal Hashing (Q3452360) (← links)
- (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond (Q3457067) (← links)
- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function (Q3503871) (← links)
- Two Notes on the Security of Certificateless Signatures (Q3503872) (← links)
- Formal Security Treatments for Signatures from Identity-Based Encryption (Q3503884) (← links)
- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography (Q3506407) (← links)
- Trapdoor Sanitizable Signatures and Their Application to Content Protection (Q3506413) (← links)
- Digital Signatures Out of Second-Preimage Resistant Hash Functions (Q3535355) (← links)
- Anonymous Proxy Signatures (Q3540046) (← links)
- Proxy Re-signatures in the Standard Model (Q3540149) (← links)
- VSH, an Efficient and Provable Collision-Resistant Hash Function (Q3593095) (← links)
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles (Q3593112) (← links)
- Programmable Hash Functions and Their Applications (Q3600211) (← links)
- Hash Functions from Sigma Protocols and Improvements to VSH (Q3600369) (← links)
- NEW EXTENSIONS OF PAIRING-BASED SIGNATURES INTO UNIVERSAL (MULTI) DESIGNATED VERIFIER SIGNATURES (Q3620617) (← links)