1![This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi](https://www.pdfsearch.io/img/ed28e5f2856010c6562ee9d748a5b1c5.jpg) | Add to Reading ListSource URL: cacr.uwaterloo.caLanguage: English - Date: 2011-07-10 02:35:13
|
---|
2![Verifiably Committed Signatures Provably Secure in The Standard Complexity Model Huafei Zhu Department of Information Science and Electronics Engineering, ZheJiang University, YuQuan Campus, HangZhou, 310027, PR. China E Verifiably Committed Signatures Provably Secure in The Standard Complexity Model Huafei Zhu Department of Information Science and Electronics Engineering, ZheJiang University, YuQuan Campus, HangZhou, 310027, PR. China E](https://www.pdfsearch.io/img/dca7b4ee52d259948754cf4d26c3cd56.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2003-11-01 04:50:33
|
---|
3![Concurrent Blind Signatures without Random Oracles∗ Aggelos Kiayias† Hong-Sheng Zhou† Abstract Concurrent Blind Signatures without Random Oracles∗ Aggelos Kiayias† Hong-Sheng Zhou† Abstract](https://www.pdfsearch.io/img/e6e277adefacb3471a99f0aaed2e6c0f.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-05-20 02:15:48
|
---|
4![A Secure Modified ID-based Undeniable Signature Scheme Sherman S.M. Chow ∗ Lucas C.K. Hui S.M. Yiu Department of Computer Science University of Hong Kong A Secure Modified ID-based Undeniable Signature Scheme Sherman S.M. Chow ∗ Lucas C.K. Hui S.M. Yiu Department of Computer Science University of Hong Kong](https://www.pdfsearch.io/img/057b45b4a292ca928c7d6b2a029e0646.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2005-02-10 16:32:44
|
---|
5![CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions](https://www.pdfsearch.io/img/0036f9671a14ee7c674b03968be03415.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2006-01-11 14:38:20
|
---|
6![CS255: Cryptography and Computer Security Winter 1999 Assignment #3 CS255: Cryptography and Computer Security Winter 1999 Assignment #3](https://www.pdfsearch.io/img/d78014fc8c532c91c68785ae2d14b2f5.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 1999-02-22 15:26:53
|
---|
7![CS255: Cryptography and Computer Security Winter 2000 Assignment #3 CS255: Cryptography and Computer Security Winter 2000 Assignment #3](https://www.pdfsearch.io/img/3eec5e9e1a186c67ac9c02935a95526a.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2000-02-14 15:44:45
|
---|
8![Verifiable Encryption of Digital Signatures and Applications GIUSEPPE ATENIESE The Johns Hopkins University This paper presents a new simple schemes for verifiable encryption of digital signatures. We make Verifiable Encryption of Digital Signatures and Applications GIUSEPPE ATENIESE The Johns Hopkins University This paper presents a new simple schemes for verifiable encryption of digital signatures. We make](https://www.pdfsearch.io/img/c247d8afae8608e301d949e870133b48.jpg) | Add to Reading ListSource URL: www.cs.jhu.eduLanguage: English - Date: 2004-05-21 14:56:23
|
---|
9![Fair Blind Signatures Markus Stadler1 , Jean-Marc Piveteau2 , Jan Camenisch1 1 Institute for Theoretical Computer Science ETH Zurich Fair Blind Signatures Markus Stadler1 , Jean-Marc Piveteau2 , Jan Camenisch1 1 Institute for Theoretical Computer Science ETH Zurich](https://www.pdfsearch.io/img/2e2d193b7913ed180638a417f2626274.jpg) | Add to Reading ListSource URL: www.ubilab.orgLanguage: English - Date: 2013-09-04 09:24:20
|
---|
10![3-11 Hysteresis Signature and Its Related Technologies to Maintain the Digital Evidence for Network Activities in Future Society TOYOSHIMA Hisashi and MIYAZAKI Kunihiko Security Requirements are varied with rapid growth 3-11 Hysteresis Signature and Its Related Technologies to Maintain the Digital Evidence for Network Activities in Future Society TOYOSHIMA Hisashi and MIYAZAKI Kunihiko Security Requirements are varied with rapid growth](https://www.pdfsearch.io/img/ced5d77860a9bf497197018aa1bcb693.jpg) | Add to Reading ListSource URL: www.nict.go.jpLanguage: English - Date: 2013-11-21 18:59:46
|
---|