Formal Security Proofs for a Signature Scheme with Partial Message Recovery (2000)

Cached

Download Links

by Daniel R. L. Brown , Don B. Johnson
Venue:Lecture Notes in Computer Science
Citations:15 - 1 self

Documents Related by Co-Citation

328 The exact security of digital signatures: How to sign with RSA and Rabin – Mihir Bellare, Phillip Rogaway - 1996
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
117 On the Exact Security of Full Domain Hash – Jean-Sebastien Coron - 2000
20 Signing on a Postcard – David Naccache, Jacques Stern - 2000
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
51 A new signature scheme based on the DSA giving message recovery – K Nyberg, R Rueppel - 1993
447 Relations among notions of security for public-key encryption schemes – Mihir Bellare, David Pointcheval, Phillip Rogaway - 1998
1172 Probabilistic encryption – S Goldwasser, S Micali - 1984
204 Optimal Asymmetric Encryption – How to Encrypt with RSA – Mihir Bellare, Phillip Rogaway - 1995
25 Design Validations for Discrete Logarithm Based Signature Schemes – Ernest Brickell, David Pointcheval, Serge Vaudenay, Moti Yung - 2000
21 Universal Padding Schemes for RSA – Jean-sébastien Coron, Marc Joye, David Naccache, Pascal Paillier, Gemplus Card International - 2002
289 A Design Principle for Hash Functions – Ivan Damg˚ard - 1990
19 Adapting the weaknesses of the Random Oracle model to the Generic Group model – Er W. Dent - 2002
581 Efficient signature generation by smart cards – C P Schnorr - 1991
2895 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
243 The Random Oracle Methodology, Revisited – Ran Canetti, Oded Goldreich, Shai Halevi - 1998
237 Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS1 – Daniel Bleichenbacher - 1998
61 How to achieve a McEliece-based digital signature scheme – Nicolas Courtois, Matthieu Finiasz, Nicolas Sendrier - 2001
6 An OAEP Variant With a Tight Security Proof – Jakob Jonsson - 2002