Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3775469

zbMath0635.94010MaRDI QIDQ3775469

Oded Goldreich

Publication date: 1987


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (22)

SoK: how (not) to design and implement post-quantum cryptographyTightly secure signatures and public-key encryptionAdventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functionsOn-line/off-line digital signaturesKey regeneration-free ciphertext-policy attribute-based encryption and its applicationShort signatures from Diffie-Hellman: realizing almost compact public keyBalancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom FunctionsA generic construction of tightly secure signatures in the multi-user settingHardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSAFrom Identification to Signatures, Tightly: A Framework and Generic TransformsRevisiting the constant-sum Winternitz one-time signature with applications to SPHINCS\textsuperscript{+} and XMSSOn the tightness of forward-secure signature reductionsUniversal Samplers with Fast VerificationTighter security proofs for GPV-IBE in the quantum random oracle modelRealizing Hash-and-Sign Signatures under Standard AssumptionsOne-Time Signatures and Chameleon Hash FunctionsAdventures in crypto dark matter: attacks and fixes for weak pseudorandom functionsLinicrypt: A Model for Practical CryptographySynthesizers and their application to the parallel construction of pseudo-random functionsTightly secure signature schemes from the LWE and subset sum assumptionsImproving the exact security of digital signature schemesPseudorandom Functions: Three Decades Later




This page was built for publication: