scientific article; zbMATH DE number 2009964
From MaRDI portal
Publication:4434883
zbMATH Open1038.94528MaRDI QIDQ4434883FDOQ4434883
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560312.htm
Title of this publication is not available (Why is that?)
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (12)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Concealment and Its Applications to Authenticated Encryption
- Provably convertible multi-authenticated encryption scheme for generalized group communications
- Speeding up exponentiation using an untrusted computational resource
- Practical convertible authenticated encryption schemes using self-certified public keys
- Compactly committing authenticated encryption using encryptment and tweakable block cipher
- Spooky Encryption and Its Applications
- On the concealability of messages by the Williams public-key encryption scheme
- On the security of joint signature and encryption revisited
- On Hiding a Plaintext Length by Preencryption
- Title not available (Why is that?)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434883)