Theory of Cryptography
From MaRDI portal
Publication:5898646
DOI10.1007/11681878zbMath1112.94020WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898646
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11681878
94A60: Cryptography
Related Items
Tighter Reductions for Forward-Secure Signature Schemes, Short Bases of Lattices over Number Fields, Interpreting Hash Function Security Proofs, Cryptographic Functions from Worst-Case Complexity Assumptions, Lattice-Based Identification Schemes Secure Under Active Attacks, Asymptotically Efficient Lattice-Based Digital Signatures, Bonsai trees, or how to delegate a lattice basis, Post-quantum cryptography: lattice signatures, The Geometry of Lattice Cryptography, Hash Functions from Sigma Protocols and Improvements to VSH, Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems