Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by C. P. Schnoor
Security of 2t-Root Identification and Signatures, Proceedings CRYPTO'98
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
Fingerprint-Based Crypto-Biometric System for Network Security
EURASIP Journal on Information Security
Security of Blind Signatures Revisited
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Improved Cloud Storage Security Framework Based on TTP Crypto Network
International Journal of Science and Research (IJSR)
Equivocal Blind Signatures and Adaptive UC-Security
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
On Tight Security Proofs for Schnorr Signatures
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Security: The Root of the Problem
Queue
Computer Science
Efficient Identification and Signatures for Smart Cards
Security Analysis of Randomize-Hash-Then-Sign Digital Signatures
Journal of Cryptology
Applied Mathematics
Computer Science Applications
Software