<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Elliptic curve cryptography / Key management / Digital Signature Standard / Digital signature / Key / Post-quantum cryptography / EdDSA / RSA / Model theory / Digital Signature Algorithm
Date: 2018-08-28 04:23:05
Cryptography
Public-key cryptography
Elliptic curve cryptography
Key management
Digital Signature Standard
Digital signature
Key
Post-quantum cryptography
EdDSA
RSA
Model theory
Digital Signature Algorithm

Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation? David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 451,65 KB

Share Document on Facebook

Similar Documents

Foxit PhantomPDF Certified Compliant with SAFE-BioPharma® Digital Signature Standard Certification Addresses Critical Industry Need for Proof of Identity Associated with Digital Signatures on Regulatory Submissions FREM

Foxit PhantomPDF Certified Compliant with SAFE-BioPharma® Digital Signature Standard Certification Addresses Critical Industry Need for Proof of Identity Associated with Digital Signatures on Regulatory Submissions FREM

DocID: 1srdd - View Document

Proceedings  - NN - RFIDSec08

Proceedings - NN - RFIDSec08

DocID: 1qGBX - View Document

PPI Sign app Secure login to portals via smartphone Portal login and EBICS signatures via smartphone in accordance with the minimum requirements for the security of internet payments

PPI Sign app Secure login to portals via smartphone Portal login and EBICS signatures via smartphone in accordance with the minimum requirements for the security of internet payments

DocID: 1oHX8 - View Document

FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

DocID: 1lHQo - View Document

THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

DocID: 1gs9P - View Document