Another look at ``provable security
From MaRDI portal
Publication:882771
DOI10.1007/s00145-005-0432-zzbMath1115.68078OpenAlexW2159047178WikidataQ56016960 ScholiaQ56016960MaRDI QIDQ882771
Neal Koblitz, Alfred J. Menezes
Publication date: 24 May 2007
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-005-0432-z
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Authentication, digital signatures and secret sharing (94A62)
Related Items (22)
Digital signature scheme set in a hidden cyclic group ⋮ Another Look at Tightness ⋮ A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs ⋮ A novel version of the hidden logarithm problem for post-quantum signature algorithms ⋮ CryptHOL: game-based proofs in higher-order logic ⋮ Device independent quantum key distribution using three-party pseudo-telepathy ⋮ The random oracle model: a twenty-year retrospective ⋮ The One-More Discrete Logarithm Assumption in the Generic Group Model ⋮ Threshold and multi-signature schemes from linear hash functions ⋮ Elliptic curve cryptography: the serpentine course of a paradigm shift ⋮ Circuit complexity of linear functions: gate elimination and feeble security ⋮ A Simple Generalization of the ElGamal Cryptosystem to Non-Abelian Groups ⋮ Gate Elimination for Linear Functions and New Feebly Secure Constructions ⋮ Optimal security proofs for full domain hash. Revisited ⋮ Chasing Diagrams in Cryptography ⋮ Interpreting Hash Function Security Proofs ⋮ Another look at automated theorem-proving ⋮ Another look at non-standard discrete log and Diffie-Hellman problems ⋮ Algorithms of information authentication for the automatic control systems on the basis of structures in finite vector spaces ⋮ Practical significance of security bounds for standardized internally re-keyed block cipher modes ⋮ Hash function requirements for Schnorr signatures ⋮ Building Secure Block Ciphers on Generic Attacks Assumptions
This page was built for publication: Another look at ``provable security