scientific article
From MaRDI portal
Publication:3775469
zbMath0635.94010MaRDI QIDQ3775469
Publication date: 1987
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (22)
SoK: how (not) to design and implement post-quantum cryptography ⋮ Tightly secure signatures and public-key encryption ⋮ Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions ⋮ On-line/off-line digital signatures ⋮ Key regeneration-free ciphertext-policy attribute-based encryption and its application ⋮ Short signatures from Diffie-Hellman: realizing almost compact public key ⋮ Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions ⋮ A generic construction of tightly secure signatures in the multi-user setting ⋮ Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA ⋮ From Identification to Signatures, Tightly: A Framework and Generic Transforms ⋮ Revisiting the constant-sum Winternitz one-time signature with applications to SPHINCS\textsuperscript{+} and XMSS ⋮ On the tightness of forward-secure signature reductions ⋮ Universal Samplers with Fast Verification ⋮ Tighter security proofs for GPV-IBE in the quantum random oracle model ⋮ Realizing Hash-and-Sign Signatures under Standard Assumptions ⋮ One-Time Signatures and Chameleon Hash Functions ⋮ Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions ⋮ Linicrypt: A Model for Practical Cryptography ⋮ Synthesizers and their application to the parallel construction of pseudo-random functions ⋮ Tightly secure signature schemes from the LWE and subset sum assumptions ⋮ Improving the exact security of digital signature schemes ⋮ Pseudorandom Functions: Three Decades Later
This page was built for publication: