Rabin signature algorithm

Results: 11



#Item
1Diffie–Hellman problem / Full Domain Hash / Rabin signature algorithm / Oracle machine / Optimal asymmetric encryption padding / Digital signature / Schnorr signature / Standard model / RSA / Cryptography / Public-key cryptography / Random oracle

THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2015-05-02 08:19:13
2RSA / Full Domain Hash / Cryptographic hash function / Random oracle / PKCS / Lamport signature / Rabin signature algorithm / Cryptography / Public-key cryptography / Digital signature

Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:36:52
3IP / Undeniable signature / ElGamal signature scheme / Rabin signature algorithm / Cryptography / Public-key cryptography / Digital signature

A Secure Modified ID-based Undeniable Signature Scheme Sherman S.M. Chow ∗ Lucas C.K. Hui S.M. Yiu Department of Computer Science University of Hong Kong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-02-10 16:32:44
4Digital signature / Rabin signature algorithm / RSA / Diffie–Hellman key exchange / ElGamal encryption / Schnorr signature / Euclidean algorithm / Naccache–Stern cryptosystem / ElGamal signature scheme / Cryptography / Public-key cryptography / XTR

Verifiable Encryption of Digital Signatures and Applications GIUSEPPE ATENIESE The Johns Hopkins University This paper presents a new simple schemes for verifiable encryption of digital signatures. We make

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-05-21 14:56:23
5Applied mathematics / RSA / Security / Digital signature / Rabin signature algorithm / ElGamal signature scheme / Public-key cryptography / Cryptography / Cyberwarfare

PSS is Secure against Random Fault Attacks Jean-S´ebastien Coron and Avradip Mandal University of Luxembourg Abstract. A fault attack consists in inducing hardware malfunctions in order to recover secrets from electroni

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2014-12-02 03:11:30
6Cyberwarfare / Mathematics / Applied mathematics / RSA / Prime number / Digital signature / Rabin signature algorithm / Public-key cryptography / Cryptography / Electronic commerce

Index Calculation Attacks on RSA Signature and Encryption Jean-S´ebastien Coron1 , Yvo Desmedt2 , David Naccache1 , Andrew Odlyzko3 , and Julien P. Stern4 1 Gemplus Card International

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2015-04-03 04:14:18
7Finite fields / BLS / Computational hardness assumptions / Digital signature / Full Domain Hash / Rabin signature algorithm / Diffie–Hellman key exchange / Diffie–Hellman problem / Elliptic Curve DSA / Cryptography / Public-key cryptography / Cryptographic protocols

Short Signatures from the Weil Pairing∗ Dan Boneh† [removed]

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2007-09-08 17:10:53
8Full Domain Hash / Error detection and correction / Random oracle / Digital signature / Rabin signature algorithm / RSA / Concrete security / Hash function / Lamport signature / Cryptography / Public-key cryptography / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-01-16 13:27:53
9Digital signature / RSA / Rabin signature algorithm / Cryptographic hash function / SHA-1 / Hash function / Lamport signature / Index of cryptography articles / Cryptography / Public-key cryptography / Full Domain Hash

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2005-03-09 20:13:37
10Pseudorandomness / Finite fields / Hard-core predicate / XTR / FO / Cryptographic hash functions / Universal hashing / Rabin signature algorithm / Cryptography / Theoretical computer science / Applied mathematics

PDF Document

Add to Reading List

Source URL: www.csc.kth.se

Language: English
UPDATE