Author:
Galbraith S.,Malone-Lee J.,Smart N.P.
Subject
Computer Science Applications,Information Systems,Signal Processing,Theoretical Computer Science
Reference6 articles.
1. Public-key encryption in a multi-user setting: Security proofs and improvements;Bellare,2000
2. The exact security of digital signatures—How to sign with RSA and Rabin;Bellare,1996
3. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack;Cramer,1998
4. A public key cryptosystem and signature scheme based on discrete logarithms;ElGamal;IEEE Trans. Inform. Theory,1985
5. A digital signature scheme secure against adaptive chosen-message attacks;Goldwasser;SIAM J. Comput.,1988
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Accountable and Secure Threshold EdDSA Signature and Its Applications;IEEE Transactions on Information Forensics and Security;2024
2. Security Analysis of RSA-BSSA;Lecture Notes in Computer Science;2023
3. Limits in the Provable Security of ECDSA Signatures;Theory of Cryptography;2023
4. On Multi-user Security of Schnorr Signature in Algebraic Group Model;International Journal of Networking and Computing;2023
5. On Multi-user Security of Schnorr Signature in Algebraic Group Model;2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW);2022-11