Amanote Research

Amanote Research

    RegisterSign In

Security of 2t-Root Identification and Signatures, Proceedings CRYPTO'98

Lecture Notes in Computer Science - Germany
doi 10.1007/bfb0052261
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 1997

Authors
C. P. Schnoor
Publisher

Springer Berlin Heidelberg


Related search

Fingerprint-Based Crypto-Biometric System for Network Security

EURASIP Journal on Information Security
2015English

Security of Blind Signatures Revisited

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Improved Cloud Storage Security Framework Based on TTP Crypto Network

International Journal of Science and Research (IJSR)
2015English

Equivocal Blind Signatures and Adaptive UC-Security

English

Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

On Tight Security Proofs for Schnorr Signatures

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Security: The Root of the Problem

Queue
Computer Science
2004English

Efficient Identification and Signatures for Smart Cards

English

Security Analysis of Randomize-Hash-Then-Sign Digital Signatures

Journal of Cryptology
Applied MathematicsComputer Science ApplicationsSoftware
2011English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2026 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy