Security of Digital Signature Schemes in Weakened Random Oracle Models
From MaRDI portal
Publication:5445458
DOI10.1007/978-3-540-78440-1_16zbMath1162.94394MaRDI QIDQ5445458
Toshiyuki Isshiki, Akira Numayama, Keisuke Tanaka
Publication date: 5 March 2008
Published in: Public Key Cryptography – PKC 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78440-1_16
Related Items
Leaky Random Oracle (Extended Abstract), Hash Functions from Defective Ideal Ciphers, On the Weak Ideal Compression Functions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Security arguments for digital signatures and blind signatures
- Computer methods for sampling from gamma, beta, Poisson and binomial distributions
- RSA-OAEP is secure under the RSA assumption
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Hash-and-Sign with Weak Hashing Made Secure
- Random Oracles and Auxiliary Input
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- How to Break MD5 and Other Hash Functions
- Constructing an Ideal Hash Function from Weak Ideal Compression Functions
- Finding Collisions in the Full SHA-1
- Strengthening Digital Signatures Via Randomized Hashing