Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
32
views
17
references
Top references
cited by
15
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,246
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — EUROCRYPT 2002
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security
other
Author(s):
Michel Abdalla
,
Jee Hea An
,
Mihir Bellare
,
Chanathip Namprempre
Publication date
(Online):
April 29 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Resource Identification
Most cited references
17
Record
: found
Abstract
: not found
Article
: not found
Security Arguments for Digital Signatures and Blind Signatures
David Pointcheval
,
Jacques Stern
(2000)
0
comments
Cited
210
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Zero-knowledge proofs of identity
Amos Fiat
,
Adi Shamir
,
Uriel Feige
(1988)
0
comments
Cited
103
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
Tatsuaki Okamoto
(1993)
0
comments
Cited
58
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2002
Publication date (Online):
April 29 2002
Pages
: 418-433
DOI:
10.1007/3-540-46035-7_28
SO-VID:
570525f5-76ab-47ef-a036-b00179cacb9e
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 222
BDD-Based Cryptanalysis of Keystream Generators
pp. 352
On Deniability in Quantum Key Exchange
pp. 110
Indistinguishability of Random Systems
pp. 209
Fast Correlation Attacks: An Algorithmic Point of View
pp. 272
Optimal Security Proofs for PSS and Other Signature Schemes
pp. 299
Cryptanalysis of the Revised NTRU Signature Scheme
pp. 321
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
pp. 337
Universally Composable Notions of Key Exchange and Secure Channels
pp. 384
A Block-Cipher Mode of Operation for Parallelizable Message Authentication
pp. 400
Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods
pp. 418
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security
pp. 450
Traitor Tracing with Constant Transmission Rate
pp. 466
Toward Hierarchical Identity-Based Encryption
pp. 482
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch
pp. 502
Perfectly Secure Message Transmission Revisited
pp. 518
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis
pp. 534
Security Flaws Induced by CBC Padding — Applications to SSL, IPSEC, WTLS...
Similar content
3,246
A reestruturação pós-fordista da produção e suas consequências sobre as novas formas de gestão de projetos na indústria automobilística brasileira. O caso da Fiasa: Fiat Automóveis S.A
Authors:
L. Cardoso
Iniciativa privada na Educação pública: a Fiat e o Programa Moto Perpétuo
Authors:
Oswaldo Gonçalves Junior
Participation of suppliers in product development process: the case of the Fiat New Palio
Authors:
J. B. Toledo
,
M. Martins
,
S. Silva
…
See all similar
Cited by
15
Traceable Signatures
Authors:
Aggelos Kiayias
,
Yiannis Tsiounis
,
Moti Yung
From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things
Authors:
Tiago Fernández-Caramés
Security Proofs for Identity-Based Identification and Signature Schemes
Authors:
Mihir Bellare
,
Chanathip Namprempre
,
Gregory Neven
See all cited by