Amanote Research

Amanote Research

    RegisterSign In

GQ and Schnorr Identification Schemes: Proofs of Security Against Impersonation Under Active and Concurrent Attacks

Lecture Notes in Computer Science - Germany
doi 10.1007/3-540-45708-9_11
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2002

Authors
Mihir BellareAdriana Palacio
Publisher

Springer Berlin Heidelberg


Related search

Lattice-Based Identification Schemes Secure Under Active Attacks

English

On Tight Security Proofs for Schnorr Signatures

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Optimal Security Proofs for PSS and Other Signature Schemes

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2002English

Machine-Checked Security Proofs of Cryptographic Signature Schemes

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

Detecting Impersonation Attacks in Future Wireless and Mobile Networks

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2006English

Server Impersonation Attacks on RFID Protocols

2008English

Wiretap-Channels Under Constrained Active and Passive Attacks

2015English

Interactive Proofs With Provable Security Against Honest Verifiers

English

A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Network

International Journal of Wireless & Mobile Networks
2013English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy