Applied Cryptography and Network Security
From MaRDI portal
Publication:4680970
DOI10.1007/B98360zbMath1103.68515OpenAlexW4301861138MaRDI QIDQ4680970
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (10)
Policy-based signature scheme from lattices ⋮ Memory lower bounds of reductions revisited ⋮ Short paper: ballot secrecy for liquid democracy ⋮ Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors ⋮ Astrolabous: a universally composable time-lock encryption scheme ⋮ Ceremonies for End-to-End Verifiable Elections ⋮ Secure Stern Signatures in Quantum Random Oracle Model ⋮ A Lattice-Based Group Signature Scheme with Message-Dependent Opening ⋮ Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library ⋮ Zero-knowledge proofs for committed symmetric Boolean functions
This page was built for publication: Applied Cryptography and Network Security