Author:
Hanzlik Lucjan,Kluczniak Kamil,Kutyłowski Mirosław
Publisher
Springer International Publishing
Reference24 articles.
1. Lecture Notes in Computer Science;M Bellare,1999
2. Lecture Notes in Computer Science;J Bender,2013
3. Lecture Notes in Computer Science;DJ Bernstein,2013
4. Lecture Notes in Computer Science;P Błaśkiewicz,2011
5. Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: Instantenous revocation of security capabilities. In: USENIX Security Symposium (2001)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Fully Subliminal-Free Schnorr Signature for Nonce;2022 Tenth International Symposium on Computing and Networking (CANDAR);2022-11
2. Communicating Through Subliminal-Free Signatures;Secure IT Systems;2021
3. Rethinking Identification Protocols from the Point of View of the GDPR;Lecture Notes in Computer Science;2019
4. Managing Your Kleptographic Subscription Plan;Codes, Cryptology and Information Security;2019
5. Subliminal Hash Channels;Algebra, Codes and Cryptology;2019