scientific article; zbMATH DE number 1263180
From MaRDI portal
Publication:4234050
zbMath0916.94005MaRDI QIDQ4234050
Publication date: 26 July 1999
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
signaturecryptographic algorithmsincremental cryptographymessage authentication schemesauthentication tags for virus protectiondocument modificationincremental encryptionprivacy of incremental authentication schemestamper-proof security
Related Items (18)
Unintended features of APIs: cryptanalysis of incremental HMAC ⋮ Incremental cryptography revisited: PRFs, nonces and modular design ⋮ A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation ⋮ Fingerprints in compressed strings ⋮ Secure storage -- confidentiality and authentication ⋮ Coding for locality in reconstructing permutations ⋮ Analysis and improvement of an authentication scheme in incremental cryptography ⋮ Incremental deterministic public-key encryption ⋮ Cryptography with Updates ⋮ Lower and upper bounds on obtaining history independence ⋮ A New Mode of Operation for Incremental Authenticated Encryption with Associated Data ⋮ Short Redactable Signatures Using Random Trees ⋮ A Sample of Samplers: A Computational Perspective on Sampling ⋮ Updatable signatures and message authentication codes ⋮ Synthesizers and their application to the parallel construction of pseudo-random functions ⋮ Sanitizable Signatures ⋮ IQRA: Incremental Quadratic Re-keying friendly Authentication scheme ⋮ Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software
This page was built for publication: