Public key compression for constrained linear signature schemes
From MaRDI portal
Publication:1726681
DOI10.1007/978-3-030-10970-7_14zbMath1447.94060OpenAlexW2889314175MaRDI QIDQ1726681
Bart Preneel, Ward Beullens, Alan Szepieniec
Publication date: 20 February 2019
Full work available at URL: https://zenodo.org/record/3405998
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the concrete hardness of learning with errors
- Advances in cryptology -- ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6--10, 2009. Proceedings
- Collision probability between sets of random variables.
- MQ signatures for PKI
- Improving stateless hash-based signatures
- Mitigating Multi-target Attacks in Hash-Based Signatures
- Design Principles for HFEv- Based Multivariate Signature Schemes
- Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- SPHINCS: Practical Stateless Hash-Based Signatures
- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model
- From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures
- CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key
- Random Oracles in a Quantum World
- A new paradigm for public key identification
- Trapdoors for hard lattices and new cryptographic constructions
- Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
- Rainbow, a New Multivariable Polynomial Signature Scheme
- Lattice-based Cryptography
- Security Bounds for the Design of Code-Based Cryptosystems
- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- Unbalanced Oil and Vinegar Signature Schemes
- Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
- Generating Shorter Bases for Hard Random Lattices