Sciweavers

13 search results - page 3 / 3
» The Security of the FDH Variant of Chaum's Undeniable Signat...
Sort
View
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
13 years 9 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
CRYPTO
2005
Springer
144views Cryptology» more  CRYPTO 2005»
13 years 11 months ago
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes
We investigate several previously suggested scenarios of instantiating random oracles (ROs) with “realizable” primitives in cryptographic schemes. As candidates for such “in...
Alexandra Boldyreva, Marc Fischlin
ASIACRYPT
2010
Springer
13 years 4 months ago
Random Oracles with(out) Programmability
This paper investigates the Random Oracle Model (ROM) feature known as programmability, which allows security reductions in the ROM to dynamically choose the range points of an ide...
Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Th...