<--- Back to Details
First PageDocument Content
Full Domain Hash / Error detection and correction / Random oracle / Digital signature / Rabin signature algorithm / RSA / Concrete security / Hash function / Lamport signature / Cryptography / Public-key cryptography / Cryptographic hash functions
Date: 2006-01-16 13:27:53
Full Domain Hash
Error detection and correction
Random oracle
Digital signature
Rabin signature algorithm
RSA
Concrete security
Hash function
Lamport signature
Cryptography
Public-key cryptography
Cryptographic hash functions

Add to Reading List

Source URL: www.iacr.org

Download Document from Source Website

File Size: 100,73 KB

Share Document on Facebook

Similar Documents

Diffie–Hellman problem / Full Domain Hash / Rabin signature algorithm / Oracle machine / Optimal asymmetric encryption padding / Digital signature / Schnorr signature / Standard model / RSA / Cryptography / Public-key cryptography / Random oracle

THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

DocID: 1gs9P - View Document

RSA / Random oracle / Optimal asymmetric encryption padding / Digital signature / Strong RSA assumption / Cryptographic hash function / Index of cryptography articles / Lamport signature / Cryptography / Public-key cryptography / Full Domain Hash

On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2

DocID: 1atOP - View Document

Electronic commerce / Cryptographic protocols / Digital signature / Blind signature / RSA / BLS / Full Domain Hash / Token / Ecash / Cryptography / Public-key cryptography / Financial cryptography

SPEcTRe: Spot-checked Private Ecash Tolling at Roadside Jeremy Day Yizhou Huang Edward Knapp

DocID: 19A4N - View Document

Random oracle / Forking lemma / Advantage / Schnorr signature / Full Domain Hash / Standard model / Public-key cryptography / Cryptography / Ciphertext indistinguishability / Digital signature

Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole

DocID: 16pCW - View Document

RSA / Full Domain Hash / Cryptographic hash function / Random oracle / PKCS / Lamport signature / Rabin signature algorithm / Cryptography / Public-key cryptography / Digital signature

Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

DocID: 15ra5 - View Document