scientific article; zbMATH DE number 1950338
From MaRDI portal
Publication:4412971
zbMath1020.94538MaRDI QIDQ4412971
Publication date: 17 July 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2384/23840144.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (20)
SoK: how (not) to design and implement post-quantum cryptography ⋮ A scalable post-quantum hash-based group signature ⋮ Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security ⋮ Unnamed Item ⋮ ID-based cryptography using symmetric primitives ⋮ On the security of joint signature and encryption revisited ⋮ A digital signature with multiple subliminal channels and its applications ⋮ WOTS-S: a quantum secure compact signature scheme for distributed ledger ⋮ Surnaming Schemes, Fast Verification, and Applications to SGX Technology ⋮ Security weaknesses in arbitrated quantum signature protocols ⋮ HORSIC: an efficient one-time signature scheme for wireless sensor networks ⋮ On the Security of the Winternitz One-Time Signature Scheme ⋮ ``Oops, I did it again -- security of one-time signatures under two-message attacks ⋮ A one-time signature using run-length encoding ⋮ An Efficient Post-Quantum One-Time Signature Scheme ⋮ An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations ⋮ Key Agreement from Close Secrets over Unsecured Channels ⋮ Practical Chosen Ciphertext Secure Encryption from Factoring ⋮ Linicrypt: A Model for Practical Cryptography ⋮ On subset-resilient hash function families
This page was built for publication: