Pages that link to "Item:Q434345"
From MaRDI portal
The following pages link to Programmable hash functions and their applications (Q434345):
Displaying 14 items.
- Optimistic fair exchange in the enhanced chosen-key model (Q476842) (← links)
- Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions (Q1671634) (← links)
- Leakage-resilient ring signature schemes (Q1711836) (← links)
- Subversion-resilient signatures: definitions, constructions and applications (Q1989360) (← links)
- Efficient digital signatures from RSA without random oracles (Q1999174) (← links)
- On instantiating the algebraic group model from falsifiable assumptions (Q2119007) (← links)
- Practical algorithm substitution attack on extractable signatures (Q2119943) (← links)
- A pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumption (Q2152147) (← links)
- Anonymous and leakage resilient IBE and IPE (Q2407713) (← links)
- Short signatures from Diffie-Hellman: realizing almost compact public key (Q2408586) (← links)
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes (Q2829951) (← links)
- Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting (Q3457062) (← links)
- Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys (Q3457069) (← links)
- Lattice-based programmable hash functions and applications (Q6182001) (← links)