Theory of Cryptography
From MaRDI portal
Publication:5898640
DOI10.1007/11681878zbMath1112.94022OpenAlexW3149533473WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898640
Mordechai M. Yung, Yunlei Zhao
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11681878
Related Items (3)
Concurrent knowledge extraction in public-key models ⋮ DSH: Deniable Secret Handshake Framework ⋮ A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles
This page was built for publication: Theory of Cryptography