scientific article; zbMATH DE number 2086723
From MaRDI portal
Publication:4737262
Recommendations
Cited in
(18)- scientific article; zbMATH DE number 176568 (Why is no real title available?)
- Unconditionally secure signature schemes revisited
- Construction methodology of unconditionally secure signature schemes
- Autotomic signatures
- Round-preserving parallel composition of probabilistic-termination cryptographic protocols
- Information Security
- Unconditionally Secure Signature Schemes Revisited
- Public Key Cryptography – PKC 2004
- Efficient unconditionally secure signatures using universal hashing
- On the security notions for homomorphic signatures
- Signature for objects: formalizing how to authenticate physical data and more
- Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)
- Must the communication graph of MPC protocols be an expander?
- scientific article; zbMATH DE number 2085422 (Why is no real title available?)
- Multi-verifier signatures
- scientific article; zbMATH DE number 1583775 (Why is no real title available?)
- Relations Among Security Notions for Undeniable Signature Schemes
- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4737262)