-
1
-
-
84947283407
-
From identification to signatures via the fiat-shamir transform: Minimizing assumptions for security and forward-security. Advances in cryptology - EUROCRYPT 2002
-
Lars R. Knudsen, ed. Springer-Verlag, Berlin, Germany, Amsterdam, The Netherlands, April 28- May 2
-
Michel Abdalla, Jee Hea An, Mihir Bellare, and Chanathip Namprempre, From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. Advances in Cryptology - EUROCRYPT 2002 (Lars R. Knudsen, ed.), Lecture Notes in Computer Science 2332, pp. 418-433. Springer-Verlag, Berlin, Germany, Amsterdam, The Netherlands, April 28- May 2, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 418-433
-
-
Abdalla, M.1
Hea An, J.2
Bellare, M.3
Namprempre, C.4
-
2
-
-
38149094108
-
Seven-property-preserving iterated hashing: ROX. Advances in cryptology - ASIACRYPT 2007
-
Kaoru Kurosawa, ed. Springer-Verlag, Berlin, Germany, Kuching, Malaysia, December 2-6
-
Elena Andreeva, Gregory Neven, Bart Preneel, and Thomas Shrimpton, Seven-Property-Preserving Iterated Hashing: ROX. Advances in Cryptology - ASIACRYPT 2007 (Kaoru Kurosawa, ed.), Lecture Notes in Computer Science 4833, pp. 130-146. Springer-Verlag, Berlin, Germany, Kuching, Malaysia, December 2-6, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4833
, pp. 130-146
-
-
Andreeva, E.1
Neven, G.2
Preneel, B.3
Shrimpton, T.4
-
3
-
-
34547339273
-
Multi-signatures in the plain public-Key model and a general forking lemma
-
DOI 10.1145/1180405.1180453, 1180453, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Mihir Bellare and Gregory Neven, Multi-signatures in the plain public-key model and a general forking lemma. ACM CCS 06: 13th Conference on Computer and Communications Secu-rity(Ari Juels, Rebecca N. Wright, and Sabrina De Capitani di Vimercati, eds.), pp. 390-399. ACM Press, Alexandria, Virginia, USA, October 30- November 3, 2006. (Pubitemid 47131386)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 390-399
-
-
Bellare, M.1
Neven, G.2
-
4
-
-
38149004817
-
Hash functions in the dedicated-key setting: Design choices and MPP transforms. ICALP 2007: 34th international colloquium on automata, languages and programming
-
Lars Arge, Christian Cachin, Tomasz Jurdzinski, and Andrzej Tarlecki, eds. SpringerVerlag, Berlin, Germany, Wroclaw, Poland, July 9-13
-
Mihir Bellare and Thomas Ristenpart, Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms. ICALP 2007: 34th International Colloquium on Automata, Languages and Programming(Lars Arge, Christian Cachin, Tomasz Jurdzinski, and Andrzej Tarlecki, eds.), Lecture Notes in Computer Science 4596, pp. 399-410. SpringerVerlag, Berlin, Germany, Wroclaw, Poland, July 9-13, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4596
, pp. 399-410
-
-
Bellare, M.1
Ristenpart, T.2
-
5
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
V. Ashby, ed. ACM Press, Fairfax, Virginia, USA, November 3-5
-
Mihir Bellare and Phillip Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. ACM CCS 93: 1st Conference on Computer and Communications Secu-rity(V. Ashby, ed.), pp. 62-73. ACM Press, Fairfax, Virginia, USA, November 3-5, 1993.
-
(1993)
ACM CCS 93: 1st Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84958663551
-
Collision-resistant hashing: Towards making UOWHFs practical
-
Advances in Cryptology - CRYPTO '97
-
-, Collision-Resistant Hashing: Towards Making UOWHFs Practical. Advances in Cryptology - CRYPTO'97 (Burton S. Kaliski Jr., ed.), Lecture Notes in Computer Science 1294, pp. 470-484. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 17-21, 1997. (Pubitemid 127112573)
-
(1997)
Lecture Notes in Computer Science
, Issue.1294
, pp. 470-484
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
84957808681
-
Design validations for discrete logarithm based signature schemes. PKC 2000: 3rd international workshop on theory and practice in public key cryptography
-
Hideki Imai and Yuliang Zheng, eds. Springer-Verlag, Berlin, Germany, Melbourne, Victoria, Australia, January 18-20
-
Ernest F. Brickell, David Pointcheval, Serge Vaudenay, and Moti Yung, Design Validations for Discrete Logarithm Based Signature Schemes. PKC 2000: 3rd International Workshop on Theory and Practice in Public Key Cryptography(Hideki Imai and Yuliang Zheng, eds.), Lecture Notes in Computer Science 1751, pp. 276-292. Springer-Verlag, Berlin, Germany, Melbourne, Victoria, Australia, January 18-20, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1751
, pp. 276-292
-
-
Brickell, E.F.1
Pointcheval, D.2
Vaudenay, S.3
Yung, M.4
-
8
-
-
9444230036
-
-
Cryptology ePrint Archive, Report 2002/026
-
Daniel R. L. Brown, Generic Groups, Collision Resistance, and ECDSA, Cryptology ePrint Archive, Report 2002/026, 2002.
-
(2002)
Generic Groups, Collision Resistance, and ECDSA
-
-
Brown, D.R.L.1
-
9
-
-
84857769616
-
On the provable security of ECDSA
-
Cambridge University Press
-
-, On the Provable Security of ECDSA. Advances in Elliptic Curve Cryptography, pp. 21-40. Cambridge University Press, 2005.
-
(2005)
Advances in Elliptic Curve Cryptography
, pp. 21-40
-
-
Brown, D.R.L.1
-
10
-
-
0031619016
-
The random oracle methodology, revisited
-
ACM Press, Dallas, Texas, USA, May 23-26
-
Ran Canetti, Oded Goldreich, and Shai Halevi, The random oracle methodology, revisited. 30th Annual ACM Symposium on Theory of Computing, pp. 209-218. ACM Press, Dallas, Texas, USA, May 23-26, 1998.
-
(1998)
30th Annual ACM Symposium on Theory of Computing
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
11
-
-
84981199109
-
A design principle for hash functions. advances in cryptology - CRYPTO'89
-
Gilles Brassard, ed. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 20-24
-
Ivan Damgård, A Design Principle for Hash Functions. Advances in Cryptology - CRYPTO'89 (Gilles Brassard, ed.), Lecture Notes in Computer Science 435, pp. 416-427. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 20-24, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 416-427
-
-
Damgård, I.1
-
12
-
-
84958745695
-
Adapting the weaknesses of the random oracle model to the generic group model. Advances in cryptology - ASIACRYPT 2002
-
Yuliang Zheng, ed. Springer-Verlag, Berlin, Germany, Queen-stown, New Zealand, December 1-5
-
Alexander W. Dent, Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model. Advances in Cryptology - ASIACRYPT 2002 (Yuliang Zheng, ed.), Lecture Notes in Computer Science 2501, pp. 100-109. Springer-Verlag, Berlin, Germany, Queen-stown, New Zealand, December 1-5, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 100-109
-
-
Dent, A.W.1
-
13
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems. Advances in cryptology - CRYPTO'86
-
Andrew M. Odlyzko, ed. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August
-
Amos Fiat and Adi Shamir, How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Advances in Cryptology - CRYPTO'86 (Andrew M. Odlyzko, ed.), Lecture Notes in Computer Science 263, pp. 186-194. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 1987.
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
14
-
-
84858653957
-
A note on security proofs in the generic model. Advances in cryptology - ASI-ACRYPT 2000
-
Tatsuaki Okamoto, ed. Springer-Verlag, Berlin, Germany, Kyoto, Japan, December 3-7
-
Marc Fischlin, A Note on Security Proofs in the Generic Model. Advances in Cryptology - ASI-ACRYPT 2000 (Tatsuaki Okamoto, ed.), Lecture Notes in Computer Science 1976, pp. 458-469. Springer-Verlag, Berlin, Germany, Kyoto, Japan, December 3-7, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 458-469
-
-
Fischlin, M.1
-
15
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest, A Digital Signature Scheme Secure Against Adaptive Chosen-message Attacks, SIAM Journal on Computing 17 (1988), pp. 281-308.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
16
-
-
33749549095
-
Strengthening digital signatures via randomized hashing
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Shai Halevi and Hugo Krawczyk, Strengthening Digital Signatures Via Randomized Hashing. Advances in Cryptology - CRYPTO 2006 (Cynthia Dwork, ed.), Lecture Notes in Computer Science 4117, pp. 41-59. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 20-24, 2006. (Pubitemid 44532108)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117
, pp. 41-59
-
-
Halevi, S.1
Krawczyk, H.2
-
17
-
-
0142002511
-
Vanstone, the elliptic curve digital signature algorithm (ECDSA)
-
Don Johnson, Alfred Menezes, and Scott A. Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA), International Journal of Information Security 1 (2001), pp. 36-63.
-
(2001)
International Journal of Information Security
, vol.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Scott, A.3
-
18
-
-
33746056045
-
Herding hash functions and the nostradamus attack
-
DOI 10.1007/11761679-12, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
John Kelsey and Tadayoshi Kohno, Herding Hash Functions and the Nostradamus Attack. Advances in Cryptology - EUROCRYPT 2006 (Serge Vaudenay, ed.), Lecture Notes in Computer Science 4004, pp. 183-200. Springer-Verlag, Berlin, Germany, St. Petersburg, Russia, May 28- June 1, 2006. (Pubitemid 44072240)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 183-200
-
-
Kelsey, J.1
Kohno, T.2
-
19
-
-
33846856917
-
Another look at "provable security"
-
Neal Koblitz and Alfred J. Menezes, Another Look at "Provable Security", Journal of Cryp-tology 20 (2007), pp. 3-37.
-
(2007)
Journal of Cryptology
, vol.20
, pp. 3-37
-
-
Koblitz, N.1
Menezes, A.J.2
-
20
-
-
33646776051
-
A failure-friendly design principle for hash functions
-
DOI 10.1007/11593447-26, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
Stefan Lucks, A Failure-Friendly Design Principle for Hash Functions. Advances in Cryp-tology - ASIACRYPT 2005 (Bimal K. Roy, ed.), Lecture Notes in Computer Science 3788, pp. 474-494. Springer-Verlag, Berlin, Germany, Chennai, India, December 4-8, 2005. (Pubitemid 43763491)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788
, pp. 474-494
-
-
Lucks, S.1
-
21
-
-
84957697337
-
Lower bounds on generic algorithms in groups
-
Advances in Cryptology - EUROCRYPT '98
-
Ueli M. Maurer and Stefan Wolf, Lower Bounds on Generic Algorithms in Groups. Advances in Cryptology - EUROCRYPT'98 (Kaisa Nyberg, ed.), Lecture Notes in Computer Science 1403, pp. 72-84. Springer-Verlag, Berlin, Germany, Espoo, Finland, May 31- June 4, 1998. (Pubitemid 128081477)
-
(1998)
Lecture Notes in Computer Science
, Issue.1403
, pp. 72-84
-
-
Maurer, U.1
Wolf, S.2
-
22
-
-
84937461306
-
One way hash functions and DES. Advances in cryptology - CRYPTO'89
-
Gilles Brassard, ed. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 20-24
-
Ralph C. Merkle, One Way Hash Functions and DES. Advances in Cryptology - CRYPTO'89 (Gilles Brassard, ed.), Lecture Notes in Computer Science 435, pp. 428-446. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 20-24, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 428-446
-
-
Merkle, R.C.1
-
23
-
-
84945124866
-
Hash functions: From Merkle-Damgård to shoup. Advances in cryptology - EUROCRYPT 2001
-
Birgit Pfitzmann, ed. Springer-Verlag, Berlin, Germany, Innsbruck, Austria, May 6-10
-
Ilya Mironov, Hash Functions: From Merkle-Damgård to Shoup. Advances in Cryptology - EUROCRYPT 2001 (Birgit Pfitzmann, ed.), Lecture Notes in Computer Science 2045, pp. 166-181. Springer-Verlag, Berlin, Germany, Innsbruck, Austria, May 6-10, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 166-181
-
-
Mironov, I.1
-
24
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
ACM Press, Seattle, Washington, USA, May 15-17
-
Moni Naor and Moti Yung, Universal one-way hash functions and their cryptographic applications. 21st Annual ACM Symposium on Theory of Computing, pp. 33-43. ACM Press, Seattle, Washington, USA, May 15-17, 1989.
-
(1989)
21st Annual ACM Symposium on Theory of Computing
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
26
-
-
84957705622
-
On concrete security treatment of signatures derived from identification
-
Advances in Cryptology - CRYPTO '98
-
Kazuo Ohta and Tatsuaki Okamoto, On Concrete Security Treatment of Signatures Derived from Identification. Advances in Cryptology - CRYPTO'98 (Hugo Krawczyk, ed.), Lecture Notes in Computer Science 1462, pp. 354-369. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 23-27, 1998. (Pubitemid 128119018)
-
(1998)
Lecture Notes in Computer Science
, Issue.1462
, pp. 354-369
-
-
Ohta, K.1
Okamoto, T.2
-
27
-
-
33646784002
-
Discrete-log-based signatures may not be equivalent to discrete log
-
DOI 10.1007/11593447-1, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
Pascal Paillier and Damien Vergnaud, Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log. Advances in Cryptology - ASIACRYPT 2005 (Bimal K. Roy, ed.), Lecture Notes in Computer Science 3788, pp. 1-20. Springer-Verlag, Berlin, Germany, Chennai, India, December 4-8, 2005. (Pubitemid 43763466)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788
, pp. 1-20
-
-
Paillier, P.1
Vergnaud, D.2
-
28
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
David Pointcheval and Jacques Stern, Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology 13 (2000), pp. 361-396.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
29
-
-
35048855067
-
Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. Fast software encryption - FSE 2004
-
Bimal K. Roy and Willi Meier, eds.) Springer-Verlag, Berlin, Germany, New Delhi, India, February 5-7
-
Phillip Rogaway and Thomas Shrimpton, Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Fast Software Encryption - FSE 2004 (Bimal K. Roy and Willi Meier, eds.), Lecture Notes in Computer Science 3017, pp. 371-388. Springer-Verlag, Berlin, Germany, New Delhi, India, February 5-7, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3017
, pp. 371-388
-
-
Rogaway, P.1
Shrimpton, T.2
-
30
-
-
0000537828
-
Efficient identification and signatures for smart cards. Advances in cryptology - CRYPTO'89
-
Gilles Brassard, ed. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 20-24
-
Claus-Peter Schnorr, Efficient Identification and Signatures for Smart Cards. Advances in Cryptology - CRYPTO'89 (Gilles Brassard, ed.), Lecture Notes in Computer Science 435, pp. 239-252. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 20-24, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 239-252
-
-
Schnorr, C.1
-
31
-
-
12344258539
-
Efficient signature generation by smart cards
-
-, Efficient Signature Generation by Smart Cards, Journal of Cryptology 4 (1991), pp. 161-174.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.1
-
32
-
-
0000164225
-
Lower bounds for discrete logarithms and related problems
-
Advances in Cryptology - Eurocrypt '97
-
Victor Shoup, Lower Bounds for Discrete Logarithms and Related Problems. Advances in Cryptology - EUROCRYPT'97 (Walter Fumy, ed.), Lecture Notes in Computer Science 1233, pp. 256-266. Springer-Verlag, Berlin, Germany, Konstanz, Germany, May 11-15, 1997. (Pubitemid 127067806)
-
(1997)
Lecture Notes in Computer Science
, Issue.1233
, pp. 256-266
-
-
Shoup, V.1
-
33
-
-
84937411969
-
Flaws in applying proof methodologies to signature schemes. Advances in cryptology - CRYPTO 2002
-
Moti Yung, ed. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 18-22
-
Jacques Stern, David Pointcheval, John Malone-Lee, and Nigel P. Smart, Flaws in Applying Proof Methodologies to Signature Schemes. Advances in Cryptology - CRYPTO 2002 (Moti Yung, ed.), Lecture Notes in Computer Science 2442, pp. 93-110. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 18-22, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 93-110
-
-
Stern, J.1
Pointcheval, D.2
Malone-Lee, J.3
Smart, N.P.4
-
34
-
-
33646754186
-
Finding collisions in the full SHA-1. Advances in cryptology - CRYPTO 2005
-
Victor Shoup, ed. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 14-18
-
Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu, Finding Collisions in the Full SHA-1. Advances in Cryptology - CRYPTO 2005 (Victor Shoup, ed.), Lecture Notes in Computer Science 3621, pp. 17-36. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 14-18, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Lisa Yin, Y.2
Yu, H.3
-
35
-
-
24944591357
-
How to break MD5 and other hash functions
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Xiaoyun Wang and Hongbo Yu, How to Break MD5 and Other Hash Functions. Advances in Cryptology - EUROCRYPT 2005 (Ronald Cramer, ed.), Lecture Notes in Computer Science 3494, pp. 19-35. Springer-Verlag, Berlin, Germany, Aarhus, Denmark, May 22-26, 2005. (Pubitemid 41313944)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
|