On concrete security treatment of signatures derived from identification
- 1 January 1998
- book chapter
- Published by Springer Nature
- p. 354-369
- https://doi.org/10.1007/bfb0055741
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- The Exact Security of Digital Signatures-How to Sign with RSA and RabinPublished by Springer Nature ,1996
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- One-way functions are necessary and sufficient for secure signaturesPublished by Association for Computing Machinery (ACM) ,1990
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- Universal one-way hash functions and their cryptographic applicationsPublished by Association for Computing Machinery (ACM) ,1989
- Zero-knowledge proofs of identityJournal of Cryptology, 1988
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- Elliptic Curve CryptosystemsMathematics of Computation, 1987
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978