Chameleon Hashing and Signatures (1998)

by Hugo Krawczyk , Tal Rabin
Citations:27 - 0 self

Active Bibliography

784 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
Efficient Deniable Authentication for Signatures Application to Machine-Readable Travel Document – Jean Monnerat, Sylvain Pasini, Serge Vaudenay
2.3 Îäíîíàïðàâëåííûå ôóíêöèè – Óèòôèëä Äèôôè Ïðåäèñëîâèå, Îñíîâíûå Ïîíÿòèÿ, Ýëåìåíòû Ïðîòîêîëîâ, Öèôðîâûå Ïîäïèñè, Îñíîâíûå Ïðîòîêîëû
623 Universally composable security: A new paradigm for cryptographic protocols – Ran Canetti - 2013
1773 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001
356 Tamper Resistance -- a Cautionary Note – Ross Anderson , Markus Kuhn - 1996
265 Efficient Group Signature Schemes for Large Groups (Extended Abstract) – Jan Camenisch, Markus Stadler - 1997
79 Robust and Efficient Sharing of RSA Functions – Rosario Gennaro, Stanislav Jarecki, Hugo Krawczyk, Tal Rabin - 1996
76 RSA-Based Undeniable Signatures – Rosario Gennaro, Hugo Krawczyk, Tal Rabin