scientific article; zbMATH DE number 1406782
From MaRDI portal
zbMATH Open0939.94530MaRDI QIDQ4940698FDOQ4940698
Authors: M. Bellare, Oded Goldreich, Shafi Goldwasser
Publication date: 1 March 2000
Title of this publication is not available (Why is that?)
Recommendations
Cited In (26)
- Sanitizable Signatures
- Title not available (Why is that?)
- Analysis and improvement of an authentication scheme in incremental cryptography
- Unintended features of APIs: cryptanalysis of incremental HMAC
- The Hash Function Family LAKE
- Coding for locality in reconstructing permutations
- Incremental deterministic public-key encryption
- Computing on authenticated data
- Agile cryptography: a universally composable approach
- Reasoning about XML update constraints
- Identity-based quotable ring signature
- Programmable hash functions and their applications
- IQRA: Incremental Quadratic Re-keying friendly Authentication scheme
- A New Mode of Operation for Incremental Authenticated Encryption with Associated Data
- Cryptography with Updates
- Short Transitive Signatures for Directed Trees
- Programmable Hash Functions and Their Applications
- Incrementally Executable Signcryptions
- Synthesizers and their application to the parallel construction of pseudo-random functions
- Updatable signatures and message authentication codes
- Short Redactable Signatures Using Random Trees
- Incremental cryptography revisited: PRFs, nonces and modular design
- A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation
- Rate-limited secure function evaluation: definitions and constructions
- Fast Interactive Coding against Adversarial Noise
- Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4940698)