scientific article; zbMATH DE number 1406782
From MaRDI portal
Publication:4940698
Recommendations
Cited in
(26)- Analysis and improvement of an authentication scheme in incremental cryptography
- scientific article; zbMATH DE number 1424196 (Why is no real title available?)
- Unintended features of APIs: cryptanalysis of incremental HMAC
- Fast interactive coding against adversarial noise
- Coding for locality in reconstructing permutations
- Incremental deterministic public-key encryption
- The Hash Function Family LAKE
- Computing on authenticated data
- Reasoning about XML update constraints
- Agile cryptography: a universally composable approach
- Identity-based quotable ring signature
- Programmable hash functions and their applications
- A New Mode of Operation for Incremental Authenticated Encryption with Associated Data
- Sanitizable signatures
- IQRA: Incremental Quadratic Re-keying friendly Authentication scheme
- Patchable indistinguishability obfuscation: \(i\mathcal {O}\) for evolving software
- Short Transitive Signatures for Directed Trees
- Programmable Hash Functions and Their Applications
- Cryptography with updates
- Synthesizers and their application to the parallel construction of pseudo-random functions
- Incrementally Executable Signcryptions
- Updatable signatures and message authentication codes
- Short Redactable Signatures Using Random Trees
- Incremental cryptography revisited: PRFs, nonces and modular design
- A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation
- Rate-limited secure function evaluation: definitions and constructions
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4940698)