Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
33
views
28
references
Top references
cited by
16
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,797
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — ASIACRYPT 2001
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
other
Author(s):
Pierre-Alain Fouque
,
David Pointcheval
Publication date
(Online):
November 20 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
28
Record
: found
Abstract
: not found
Article
: not found
Security Arguments for Digital Signatures and Blind Signatures
David Pointcheval
,
Jacques Stern
(2000)
0
comments
Cited
210
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
Ronald Cramer
,
Victor Shoup
(1998)
0
comments
Cited
177
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Optimal asymmetric encryption
Mihir Bellare
,
Phillip Rogaway
(1995)
0
comments
Cited
114
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2001
Publication date (Online):
November 20 2001
Pages
: 351-368
DOI:
10.1007/3-540-45682-1_21
SO-VID:
6449969d-c3c2-4c07-8dd7-73e4584ca758
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001
pp. 442
Practical Construction and Analysis of Pseudo-Randomness Primitives
pp. 67
Unbelievable Security Matching AES Security Using Public Key Systems
pp. 107
Computation of Discrete Logarithms in \( \mathbb{F}_{2^{607} } \)
pp. 125
Speeding Up XTR
pp. 144
An Efficient Implementation of Braid Groups
pp. 222
Generic Attacks on Feistel Schemes
pp. 351
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
pp. 480
An Extension of Kedlaya’s Point-Counting Algorithm to Superelliptic Curves
pp. 533
Self-Blindable Credential Certificates from the Weil Pairing
Similar content
2,797
Radiological Imaging of Gastro-Entero-Pancreatic Neuroendocrine Tumors. The Review of Current Literature Emphasizing the Diagnostic Value of Chosen Imaging Methods
Authors:
Gabriela Półtorak-Szymczak
,
Tadeusz Budlewski
,
Mariusz Ireneusz Furmanek
…
Molecular karyotype of clone CL Brener chosen for the Trypanosoma cruzi genome project
Authors:
M. Cano,
,
A. Gruber-Eber
,
M Vazquez-Vilar
…
Methodology of watching, recording end evaluating the employment of chosen machine equipment and its details in the Ostrava-Karvina district
Authors:
See all similar
Cited by
16
An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys
Authors:
Jian Weng
,
Kim-Kwang Choo
,
Robert Deng
…
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers
Authors:
Ximeng Liu
,
Kim-Kwang Choo
,
Robert Deng
…
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors
Authors:
Benoit Libert
,
San Ling
,
Khoa Nguyen
…
See all cited by