Introduction to security reduction
From MaRDI portal
Publication:3174853
DOI10.1007/978-3-319-93049-7zbMATH Open1437.94002OpenAlexW2810013968MaRDI QIDQ3174853FDOQ3174853
Willy Susilo, Yi Mu, Fuchun Guo
Publication date: 18 July 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-93049-7
Recommendations
digital signaturegroup-based cryptographyidentity based cryptographyencryption schemesecurity reduction
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01)
Cited In (5)
- A new post-quantum multivariate polynomial public key encapsulation algorithm
- Privacy and integrity properties of ECIES scheme
- Format-preserving encryption: a survey
- Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management
- An injectivity analysis of Crystals-Kyber and implications on quantum security
This page was built for publication: Introduction to security reduction
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3174853)