Pages that link to "Item:Q3787914"
From MaRDI portal
The following pages link to A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks (Q3787914):
Displayed 50 items.
- How (not) to design strong-RSA signatures (Q2430687) (← links)
- Security weaknesses in arbitrated quantum signature protocols (Q2443972) (← links)
- A provably secure short signature scheme based on discrete logarithms (Q2456500) (← links)
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks (Q2456502) (← links)
- Hybrid proxy multisignature: a new type multi-party signature (Q2465334) (← links)
- Towards a theory of data entanglement (Q2465624) (← links)
- New \((t, n)\) threshold directed signature scheme with provable security (Q2466072) (← links)
- Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs (Q2481774) (← links)
- Cryptanalysis of ISO/IEC 9796-1 (Q2482334) (← links)
- Breaking and fixing public-key Kerberos (Q2482453) (← links)
- Fine-grained forward-secure signature schemes without random oracles (Q2489913) (← links)
- Tight security for signature schemes without random oracles (Q2516531) (← links)
- Cryptanalysis of some signature schemes with message recovery (Q2572002) (← links)
- Generic groups, collision resistance, and ECDSA (Q2572964) (← links)
- Signcryption with non-interactive non-repudiation (Q2572979) (← links)
- Authenticated broadcast with a partially compromised public-key infrastructure (Q2637312) (← links)
- Scalable Divisible E-cash (Q2794505) (← links)
- Proxy Signature with Revocation (Q2817801) (← links)
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security (Q2822671) (← links)
- Optimal Security Proofs for Signatures from Identification Schemes (Q2829210) (← links)
- On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings (Q2829956) (← links)
- A strong designated verifier signature scheme tightly related to the LRSW assumption (Q2868163) (← links)
- Short Transitive Signatures for Directed Trees (Q2889993) (← links)
- Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More (Q2890012) (← links)
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy (Q2947523) (← links)
- From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures (Q2953775) (← links)
- Adaptive Oblivious Transfer and Generalization (Q2953778) (← links)
- From Identification to Signatures, Tightly: A Framework and Generic Transforms (Q2953785) (← links)
- One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model (Q2980868) (← links)
- Applications of Signcryption (Q3000039) (← links)
- On the Security of the Winternitz One-Time Signature Scheme (Q3011927) (← links)
- Adaptively Secure Non-interactive Threshold Cryptosystems (Q3012950) (← links)
- Security of signature schemes in the presence of key-dependent messages (Q3075869) (← links)
- One-Time Signatures and Chameleon Hash Functions (Q3084263) (← links)
- On Security Preserving Reductions – Revised Terminology (Q3088200) (← links)
- Cryptographic Verification by Typing for a Sample Protocol Implementation (Q3092172) (← links)
- On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack (Q3102784) (← links)
- XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions (Q3102787) (← links)
- Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes (Q3104713) (← links)
- Adaptive Succinct Garbled RAM or: How to Delegate Your Database (Q3181022) (← links)
- Provable security of digital signatures in the tamper-proof device model (Q3184555) (← links)
- Security of Verifiably Encrypted Signatures and a Construction without Random Oracles (Q3392898) (← links)
- Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures (Q3392908) (← links)
- Universally Composable Adaptive Priced Oblivious Transfer (Q3392915) (← links)
- A Storage Efficient Redactable Signature in the Standard Model (Q3399214) (← links)
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems (Q3408192) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs (Q3408212) (← links)
- Merkle tree digital signature and trusted computing platform (Q3443186) (← links)
- Anonymous Communication and Anonymous Cash (Q3452339) (← links)