Author:
Błaśkiewicz Przemysław,Hanzlik Lucjan,Kluczniak Kamil,Krzywiecki Łukasz,Kutyłowski Mirosław,Słowik Marcin,Wszoła Marta
Reference28 articles.
1. Alwen, J., Dodis, Y., & Wichs, D. (2009). Leakage-resilient public-key cryptography in the bounded-retrieval model. In S. Halevi (ed.), Advances in Cryptology - CRYPTO 2009: 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 2009. Proceedings (pp. 36–54). Berlin: Springer.
https://doi.org/10.1007/978-3-642-03356-8_3
.
2. Bellare, M., Fischlin, M., Goldwasser, S., & Micali, S. (2001). Identification protocols secure against reset attacks. In B. Pfitzmann (ed.), Advances in Cryptology — EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, 6–10 May 2001, Proceedings (pp. 495–511). Berlin: Springer.
https://doi.org/10.1007/3-540-44987-6_30
.
3. Boneh, D., & Boyen, X. (2008). Short signatures without random oracles and the SDH assumption in bilinear groups. Journal of Cryptology, 21(2), 149–177.
https://doi.org/10.1007/s00145-007-9005-7
.
4. Bringer, J., Chabanne, H., Lescuyer, R., & Patey, A. (2014). Efficient and strongly secure dynamic domain-specific pseudonymous signatures for ID documents. IACR Cryptology ePrint Archive, 2014, 67.
http://eprint.iacr.org/2014/067
.
5. BSI: Technical guideline TR-03110 v2.21 – advanced security mechanisms for machine readable travel documents and eIDAS token (2016).
https://www.bsi.bund.de/EN/Publications/TechnicalGuidelines/TR03110/BSITR03110.html
.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献