scientific article; zbMATH DE number 2009957
From MaRDI portal
Publication:4434877
zbMATH Open1038.94538MaRDI QIDQ4434877FDOQ4434877
Authors: Jonathan Katz
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560211.htm
Title of this publication is not available (Why is that?)
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (17)
- Expander-Based Cryptography Meets Natural Proofs
- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks
- Generic transformation from broadcast encryption to round-optimal deniable ring authentication
- Completely Non-malleable Encryption Revisited
- Strong Knowledge Extractors for Public-Key Encryption Schemes
- NM-CPA secure encryption with proofs of plaintext knowledge
- A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
- A note on universal composable zero-knowledge in the common reference string model
- Efficient Proofs of Secure Erasure
- Cryptographic reverse firewalls for interactive proof systems
- Novel \(\Omega\)-protocols for NP
- Interactive encryption and message authentication
- Block-wise P-signatures and non-interactive anonymous credentials with efficient attributes
- Security problems with a chaos-based deniable authentication scheme
- New approaches for deniable authentication
- A new framework for deniable secure key exchange
- Provable Security of BLAKE with Non-ideal Compression Function
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434877)