On the Joint Security of Encryption and Signature in EMV
From MaRDI portal
Publication:2890000
DOI10.1007/978-3-642-27954-6_8zbMath1292.94053OpenAlexW1886381013MaRDI QIDQ2890000
Kenneth G. Paterson, Mario Strefler, Jean Paul Degabriele, Anja Lehmann, Nigel P. Smart
Publication date: 8 June 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-27954-6_8
Related Items
SoK: how (not) to design and implement post-quantum cryptography ⋮ Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds) ⋮ A formal security analysis of the Signal messaging protocol ⋮ Certificate-Based Generalized Ring Signcryption Scheme ⋮ Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption ⋮ Combined schemes for signature and encryption: the public-key and the identity-based setting
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Security arguments for digital signatures and blind signatures
- Generic groups, collision resistance, and ECDSA
- On the Joint Security of Encryption and Signature, Revisited
- Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
- Hash function requirements for Schnorr signatures
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- The Exact Security of ECIES in the Generic Group Model
- Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries
- Fault Attacks Against emv Signatures
- Advances in Cryptology - CRYPTO 2003
- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log