Honey encryption applied to Schnorr signature scheme
From MaRDI portal
Publication:6568607
Recommendations
- Honey encryption: security beyond the brute-force bound
- Honey encryption for language. Robbing Shannon to pay Turing?
- Honey Encryption Beyond Message Recovery Security
- Fooling an unbounded adversary with a short key, repeatedly: The honey encryption perspective
- On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks
This page was built for publication: Honey encryption applied to Schnorr signature scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6568607)