Honey encryption applied to Schnorr signature scheme
From MaRDI portal
Publication:6568607
DOI10.18523/2617-7080420213-6WikidataQ114845672 ScholiaQ114845672MaRDI QIDQ6568607FDOQ6568607
Authors: M. A. Oliĭnyk
Publication date: 8 July 2024
Published in: Mogylyans'kyĭ Matematychnyĭ Zhurnal (Search for Journal in Brave)
Recommendations
- Honey encryption: security beyond the brute-force bound
- Honey encryption for language. Robbing Shannon to pay Turing?
- Honey Encryption Beyond Message Recovery Security
- Fooling an unbounded adversary with a short key, repeatedly: The honey encryption perspective
- On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks
This page was built for publication: Honey encryption applied to Schnorr signature scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6568607)