Pages that link to "Item:Q702188"
From MaRDI portal
The following pages link to Security of signature schemes in a multi-user setting (Q702188):
Displaying 17 items.
- How to achieve non-repudiation of origin with privacy protection in cloud computing (Q394727) (← links)
- Security of BLS and BGLS signatures in a multi-user setting (Q680920) (← links)
- Generic construction for tightly-secure signatures from discrete log (Q820557) (← links)
- On the security of the Courtois-Finiasz-Sendrier signature (Q1643411) (← links)
- On the tightness of forward-secure signature reductions (Q1715854) (← links)
- Malleability and ownership of proxy signatures: towards a stronger definition and its limitations (Q2176286) (← links)
- The lattice-based digital signature scheme qTESLA (Q2229291) (← links)
- Connecting tweakable and multi-key blockcipher security (Q2413014) (← links)
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge (Q2416940) (← links)
- How (not) to design strong-RSA signatures (Q2430687) (← links)
- Generic groups, collision resistance, and ECDSA (Q2572964) (← links)
- A strong designated verifier signature scheme tightly related to the LRSW assumption (Q2868163) (← links)
- Another Look at Tightness (Q2889878) (← links)
- Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes (Q3194597) (← links)
- Атаки на схемы электронной подписи, не учитываемые традиционными определениями стойкости, и меры противодействия им (Q5152416) (← links)
- Key Substitution in the Symbolic Analysis of Cryptographic Protocols (Q5458828) (← links)
- A key substitution attack on SFLASH<sup><i>v</i>3</sup> (Q5717986) (← links)