The following pages link to (Q4737250):
Displaying 36 items.
- Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier (Q293718) (← links)
- Sequential aggregate signatures with lazy verification from trapdoor permutations (Q476200) (← links)
- Generic construction for tightly-secure signatures from discrete log (Q820557) (← links)
- On the security loss of unique signatures (Q1629431) (← links)
- Quantum algorithms for the \(k\)-XOR problem (Q1633472) (← links)
- On the security of the Courtois-Finiasz-Sendrier signature (Q1643411) (← links)
- Memory lower bounds of reductions revisited (Q1648781) (← links)
- Simple and more efficient PRFs with tight security from LWE and matrix-DDH (Q1710687) (← links)
- On the tightness of forward-secure signature reductions (Q1715854) (← links)
- Optimal security proofs for full domain hash. Revisited (Q1747667) (← links)
- Subversion-resilient signatures: definitions, constructions and applications (Q1989360) (← links)
- On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments (Q2044755) (← links)
- Tight and optimal reductions for signatures based on average trapdoor preimage sampleable functions and applications to code-based signatures (Q2055702) (← links)
- Impossibility on tamper-resilient cryptography with uniqueness properties (Q2061927) (← links)
- Verifiable random functions with optimal tightness (Q2061948) (← links)
- On selective-opening security of deterministic primitives (Q2061952) (← links)
- Better concrete security for half-gates garbling (in the multi-instance setting) (Q2096549) (← links)
- Optimal tightness for chain-based unique signatures (Q2170062) (← links)
- Hiding in plain sight: memory-tight proofs via randomness programming (Q2170068) (← links)
- Generalized public-key cryptography with tight security (Q2225176) (← links)
- Identity-based signatures in standard model (Q2317833) (← links)
- On tight security proofs for Schnorr signatures (Q2423848) (← links)
- On the adaptive security of MACs and PRFs (Q2692364) (← links)
- Towards tight adaptive security of non-interactive key exchange (Q2697896) (← links)
- Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions (Q2827730) (← links)
- Another Look at Tightness (Q2889878) (← links)
- Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model (Q3092365) (← links)
- Towards Non-Black-Box Separations of Public Key Encryption and One Way Function (Q3181026) (← links)
- Salvaging Merkle-Damgård for Practical Applications (Q3627446) (← links)
- On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness (Q5041170) (← links)
- Security of Digital Signature Schemes in Weakened Random Oracle Models (Q5445458) (← links)
- Leaky Random Oracle (Extended Abstract) (Q5505472) (← links)
- How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions (Q5505473) (← links)
- A tightly secure ID-based signature scheme under DL assumption in AGM (Q6535485) (← links)
- On proving equivalence class signatures secure from non-interactive assumptions (Q6635743) (← links)
- New limits of provable security and applications to ElGamal encryption (Q6637527) (← links)