Rabin signature algorithm

Results: 11



#Item
1THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2015-05-02 08:19:13
2Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:36:52
3A Secure Modified ID-based Undeniable Signature Scheme Sherman S.M. Chow ∗ Lucas C.K. Hui S.M. Yiu Department of Computer Science University of Hong Kong

A Secure Modified ID-based Undeniable Signature Scheme Sherman S.M. Chow ∗ Lucas C.K. Hui S.M. Yiu Department of Computer Science University of Hong Kong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-02-10 16:32:44
4Verifiable Encryption of Digital Signatures and Applications GIUSEPPE ATENIESE The Johns Hopkins University  This paper presents a new simple schemes for verifiable encryption of digital signatures. We make

Verifiable Encryption of Digital Signatures and Applications GIUSEPPE ATENIESE The Johns Hopkins University This paper presents a new simple schemes for verifiable encryption of digital signatures. We make

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-05-21 14:56:23
5PSS is Secure against Random Fault Attacks Jean-S´ebastien Coron and Avradip Mandal University of Luxembourg Abstract. A fault attack consists in inducing hardware malfunctions in order to recover secrets from electroni

PSS is Secure against Random Fault Attacks Jean-S´ebastien Coron and Avradip Mandal University of Luxembourg Abstract. A fault attack consists in inducing hardware malfunctions in order to recover secrets from electroni

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2014-12-02 03:11:30
6Index Calculation Attacks on RSA Signature and Encryption Jean-S´ebastien Coron1 , Yvo Desmedt2 , David Naccache1 , Andrew Odlyzko3 , and Julien P. Stern4 1  Gemplus Card International

Index Calculation Attacks on RSA Signature and Encryption Jean-S´ebastien Coron1 , Yvo Desmedt2 , David Naccache1 , Andrew Odlyzko3 , and Julien P. Stern4 1 Gemplus Card International

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2015-04-03 04:14:18
7Short Signatures from the Weil Pairing∗ Dan Boneh† [removed]

Short Signatures from the Weil Pairing∗ Dan Boneh† [removed]

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2007-09-08 17:10:53
8

PDF Document

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-01-16 13:27:53
9

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2005-03-09 20:13:37
10

PDF Document

Add to Reading List

Source URL: www.csc.kth.se

Language: English