Security Proofs for Signature Schemes
- 1 January 1996
- book chapter
- Published by Springer Nature
- p. 387-398
- https://doi.org/10.1007/3-540-68339-9_33
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- An Efficient Identification Scheme Based on Permuted Kernels (extended abstract)Published by Springer Nature ,2001
- Efficient Identification and Signatures for Smart CardsPublished by Springer Nature ,2001
- A New Identification Scheme Based on the Perceptrons ProblemPublished by Springer Nature ,1995
- A new identification scheme based on syndrome decodingPublished by Springer Nature ,1994
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and MemoryPublished by Springer Nature ,1988
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- The knowledge complexity of interactive proof-systemsPublished by Association for Computing Machinery (ACM) ,1985
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976