Applications of timed-release encryption with implicit authentication
From MaRDI portal
Publication:6186366
DOI10.1007/978-3-031-37679-5_21MaRDI QIDQ6186366FDOQ6186366
Elizabeth A. Quaglia, Liam Medley, Angelique Faye Loe, Christian O'Connell
Publication date: 2 February 2024
Published in: Progress in Cryptology - AFRICACRYPT 2023 (Search for Journal in Brave)
Cites Work
- Introduction to algorithms.
- A method for obtaining digital signatures and public-key cryptosystems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Riemann's hypothesis and tests for primality
- Title not available (Why is that?)
- How to construct efficient signcryption schemes on elliptic curves
- A Simple Unpredictable Pseudo-Random Number Generator
- On the linear complexity profile of the power generator
- Title not available (Why is that?)
- Introduction to modern cryptography.
- Period of the power generator and small values of Carmichael's function
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information and Communications Security
- Title not available (Why is that?)
- Verifiable delay functions
- Investigations in higher arithmetic. Edited in German by H. Maser
- Simple verifiable delay functions
- Efficient verifiable delay functions
- Kurtosis as Peakedness, 1905–2014.R.I.P.
- Delay encryption
- Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)
- Title not available (Why is that?)
- TIDE: a novel approach to constructing timed-release encryption
This page was built for publication: Applications of timed-release encryption with implicit authentication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6186366)