Author:
Galbraith S.,Malone-Lee J.,Smart N.P.
Subject
Computer Science Applications,Information Systems,Signal Processing,Theoretical Computer Science
Reference6 articles.
1. Public-key encryption in a multi-user setting: Security proofs and improvements;Bellare,2000
2. The exact security of digital signatures—How to sign with RSA and Rabin;Bellare,1996
3. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack;Cramer,1998
4. A public key cryptosystem and signature scheme based on discrete logarithms;ElGamal;IEEE Trans. Inform. Theory,1985
5. A digital signature scheme secure against adaptive chosen-message attacks;Goldwasser;SIAM J. Comput.,1988
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献