Amanote Research

Amanote Research

    RegisterSign In

Security Analysis of Randomize-Hash-Then-Sign Digital Signatures

Journal of Cryptology - United States
doi 10.1007/s00145-011-9109-y
Full Text
Open PDF
Abstract

Available in full text

Categories
Applied MathematicsComputer Science ApplicationsSoftware
Date

October 12, 2011

Authors
Praveen GauravaramLars R. Knudsen
Publisher

Springer Science and Business Media LLC


Related search

Multivariate and Hash-Based Post-Quantum Digital Signatures.

English

Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2002English

Tightly-Secure Signatures From Chameleon Hash Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2015English

Interpreting Hash Function Security Proofs

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Security in Cloud Computing- Hash Function

International Journal of Computer Applications
2013English

Javascript Security Using Cryptographic Hash Functions

Advanced Information Systems
2019English

Security of Blind Signatures Revisited

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Security Proof for Partial-Domain Hash Signature Schemes

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2002English

Unconditionally-Secure Digital Signatures

English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy