1![THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d](https://www.pdfsearch.io/img/06ba9d4c93aa61ad3b9fd48f701b6964.jpg) | Add to Reading ListSource URL: cacr.uwaterloo.caLanguage: English - Date: 2015-05-02 08:19:13
|
---|
2![On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2 On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2](https://www.pdfsearch.io/img/d03bad3b2220325e3b50ecdd983f3f03.jpg) | Add to Reading ListSource URL: www.cs.tau.ac.ilLanguage: English - Date: 2013-06-11 04:12:51
|
---|
3![SPEcTRe: Spot-checked Private Ecash Tolling at Roadside Jeremy Day Yizhou Huang Edward Knapp SPEcTRe: Spot-checked Private Ecash Tolling at Roadside Jeremy Day Yizhou Huang Edward Knapp](https://www.pdfsearch.io/img/e1080e9a5a28504d3db638149dac2a8c.jpg) | Add to Reading ListSource URL: www.cypherpunks.caLanguage: English - Date: 2011-08-21 13:44:16
|
---|
4![Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole](https://www.pdfsearch.io/img/bab2a409b15f66a39493fe87a005d94a.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2013-12-18 04:58:38
|
---|
5![Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive. Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.](https://www.pdfsearch.io/img/502b0722d83f2d8af9875f2ee37e79ef.jpg) | Add to Reading ListSource URL: cseweb.ucsd.eduLanguage: English - Date: 2009-09-20 23:36:52
|
---|
6![On the Impossibility of Instantiating PSS in the Standard Model Rishiraj Bhattacharyya1 and Avradip Mandal2 1 Cryptology Research Group, Applied Statistics Unit, Indian Statistical Institute, On the Impossibility of Instantiating PSS in the Standard Model Rishiraj Bhattacharyya1 and Avradip Mandal2 1 Cryptology Research Group, Applied Statistics Unit, Indian Statistical Institute,](https://www.pdfsearch.io/img/5bd41338b286e3c523e4e7bc932e109a.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-12-21 12:09:46
|
---|
7![MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog](https://www.pdfsearch.io/img/933e44c97bdea36ff2a2ac694fe3a3a7.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2013-12-30 04:23:42
|
---|
8![V GUIDE Table of Contents Preface Program Committee V GUIDE Table of Contents Preface Program Committee](https://www.pdfsearch.io/img/8ace2538ed5465e18bcc7d0b4d2ff19d.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2006-01-16 14:16:27
|
---|
9![Extendable-Output Functions (XOFs) Ray Perlner Computer Security Division, NIST [removed] SHA[removed]Workshop Extendable-Output Functions (XOFs) Ray Perlner Computer Security Division, NIST [removed] SHA[removed]Workshop](https://www.pdfsearch.io/img/0878689fdc1958749402151e095d599c.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2014-08-22 14:11:38
|
---|
10![Microsoft PowerPoint - Eurocrypt2012-TightFiatShamir-final.pptx Microsoft PowerPoint - Eurocrypt2012-TightFiatShamir-final.pptx](https://www.pdfsearch.io/img/e21c571da85f51134e118669c862b9f9.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2012-04-20 07:04:21
|
---|