Sciweavers

ASIACRYPT
2004
Springer
13 years 10 months ago
On Provably Secure Time-Stamping Schemes
Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the underlying hash function is collisionresistant but still no rigorous proofs have...
Ahto Buldas, Märt Saarepera
ASIACRYPT
2004
Springer
13 years 10 months ago
On the Generalized Linear Equivalence of Functions Over Finite Fields
Luca Breveglieri, Alessandra Cherubini, Marco Macc...
ASIACRYPT
2004
Springer
13 years 10 months ago
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge
In the bare public-key model, introduced by Canetti et al. [STOC 2000], it is only assumed that each verifier deposits during a setup phase a public key in a file accessible by a...
Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Vis...