Another look at ``provable security

From MaRDI portal
Publication:882771

DOI10.1007/s00145-005-0432-zzbMath1115.68078OpenAlexW2159047178WikidataQ56016960 ScholiaQ56016960MaRDI QIDQ882771

Neal Koblitz, Alfred J. Menezes

Publication date: 24 May 2007

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-005-0432-z




Related Items (22)

Digital signature scheme set in a hidden cyclic groupAnother Look at TightnessA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsA novel version of the hidden logarithm problem for post-quantum signature algorithmsCryptHOL: game-based proofs in higher-order logicDevice independent quantum key distribution using three-party pseudo-telepathyThe random oracle model: a twenty-year retrospectiveThe One-More Discrete Logarithm Assumption in the Generic Group ModelThreshold and multi-signature schemes from linear hash functionsElliptic curve cryptography: the serpentine course of a paradigm shiftCircuit complexity of linear functions: gate elimination and feeble securityA Simple Generalization of the ElGamal Cryptosystem to Non-Abelian GroupsGate Elimination for Linear Functions and New Feebly Secure ConstructionsOptimal security proofs for full domain hash. RevisitedChasing Diagrams in CryptographyInterpreting Hash Function Security ProofsAnother look at automated theorem-provingAnother look at non-standard discrete log and Diffie-Hellman problemsAlgorithms of information authentication for the automatic control systems on the basis of structures in finite vector spacesPractical significance of security bounds for standardized internally re-keyed block cipher modesHash function requirements for Schnorr signaturesBuilding Secure Block Ciphers on Generic Attacks Assumptions




This page was built for publication: Another look at ``provable security