Amanote Research

Amanote Research

    RegisterSign In

Tightly-Secure Signatures From Chameleon Hash Functions

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-662-46447-2_12
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2015

Authors
Olivier BlazySaqib A. KakviEike KiltzJiaxin Pan
Publisher

Springer Berlin Heidelberg


Related search

Tightly Secure Signatures From Lossy Identification Schemes

Journal of Cryptology
Applied MathematicsComputer Science ApplicationsSoftware
2015English

Building Provably Secure Block Ciphers From Cryptographic Hash Functions

International Journal of Computer Applications
2020English

CCA-Secure Public Key Encryption Without Group-Dependent Hash Functions

IEICE Transactions on Information and Systems
Electronic EngineeringPattern RecognitionHardwareComputer VisionElectricalArchitectureArtificial IntelligenceSoftware
2009English

Parameterized Hash Functions

Annales UMCS, Informatica
2012English

Cryptographic Hash Functions

2010English

Secure Virtualisation Using Hash Key Authentication

International Journal of Scientific Research in Computer Science, Engineering and Information Technology
2018English

CCA-Secure IB-KEM From Identity-Based Extractable Hash Proof System

Computer Journal
Computer Science
2013English

Unconditionally-Secure Digital Signatures

English

On Hash Functions Using Checksums

International Journal of Information Security
Information SystemsRiskComputer NetworksCommunicationsReliabilitySafetyQualitySoftware
2009English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy