scientific article; zbMATH DE number 1406782
From MaRDI portal
Publication:4940698
zbMath0939.94530MaRDI QIDQ4940698
Shafi Goldwasser, Mihir Bellare, Oded Goldreich
Publication date: 1 March 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (23)
Short Transitive Signatures for Directed Trees ⋮ Unintended features of APIs: cryptanalysis of incremental HMAC ⋮ Incremental cryptography revisited: PRFs, nonces and modular design ⋮ A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation ⋮ Coding for locality in reconstructing permutations ⋮ Programmable hash functions and their applications ⋮ The Hash Function Family LAKE ⋮ Reasoning about XML update constraints ⋮ Analysis and improvement of an authentication scheme in incremental cryptography ⋮ Incremental deterministic public-key encryption ⋮ Identity-based quotable ring signature ⋮ Rate-Limited Secure Function Evaluation: Definitions and Constructions ⋮ Cryptography with Updates ⋮ Programmable Hash Functions and Their Applications ⋮ A New Mode of Operation for Incremental Authenticated Encryption with Associated Data ⋮ Short Redactable Signatures Using Random Trees ⋮ Updatable signatures and message authentication codes ⋮ Synthesizers and their application to the parallel construction of pseudo-random functions ⋮ Fast Interactive Coding against Adversarial Noise ⋮ Computing on authenticated data ⋮ Sanitizable Signatures ⋮ IQRA: Incremental Quadratic Re-keying friendly Authentication scheme ⋮ Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software
This page was built for publication: