- Home
- » Tags
- » Schnorr signature
Top View
- Provable Security in Cryptography ---DL-Based Systems
- A Secure Publish/Subscribe Protocol for Internet of Things
- Analysis of Bitcoin Improvement Proposal 340 — Schnorr Signatures
- Schnorr Signatures with Application to Bitcoin
- Provably Secure and Subliminal-Free Variant of Schnorr Signature
- Asymmetric Cryptography and Practical Security
- Progress on Cryptography
- Digital Signatures (Ctd.) Lecture 17 RECALL Digital Signatures
- Hash Function Requirements for Schnorr Signatures
- Public Key Cryptography: Theory One-More Assumptions Do Not Help Fiat-Shamir-Type Signature Schemes in NPROM
- Cryptography in the Real World Discrete-Log Based Cryptography
- A Signature Scheme As Secure As the Diffie-Hellman Problem
- Practical Cryptography in High Dimensional Tori
- A Distributed Private-Key Generator for Identity-Based Cryptography
- Simple Schnorr Signature with Pedersen Commitment As Key
- Signcryption Scheme Based on Schnorr Digital Signature
- LNCS 4450, Pp
- Evaluation of Using Pairing-Based Cryptography in Byzcoin
- Taming the Many Eddsas
- Anonymizable Ring Signature Without Pairing Olivier Blazy, Xavier Bultel, Pascal Lafourcade
- On Robust Key Agreement Based on Public Key Authentication (Short Paper)
- Fixing TPM 2.0 for Provably Secure Anonymous Attestation
- Cryptography and Network Security Chapter 13
- Dissecting Schnorr's Digital Signature Scheme
- A Pairing-Free Identity-Based Identification Scheme with Tight
- LNCS 9065, Pp
- A Group Signature Scheme Based on an RSA-Variant Copyright C 1998, BRICS, Department of Computer Science University of Aarhus
- Making the Diffie-Hellman Protocol Identity-Based*
- Master's Thesis a Study on Attacks Against Nonces in Schnorr-Like
- A Variant of BLS Signature Scheme with Tight Security Reduction
- Non-Interactive Half-Aggregation of Eddsa and Variants of Schnorr Signatures
- The Provable Security of Ed25519: Theory and Practice
- High Performance Compression Algorithm for Lattice-Based Signatures
- Tightly-Secure Signatures from Lossy Identification Schemes
- Public-Key Cryptography Theory and Practice
- Efficient Extension of Standard Schnorr/RSA Signatures Into
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Multi-User Schnorr Security, Revisited
- Implementation and Adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication
- ANR Project ECLIPSES Elliptic Curve Leakage-Immune Processing for Secure Embedded Systems
- Lattice-Based Signature Schemes and Their Sensitivity to Fault Attacks
- Study of Digital Signature Schemes for Gnss Signal Authentication and Integrity Protection
- On Robust Key Agreement Based on Public Key Authentication Feng Hao School of Computing Science Newcastle University, UK [email protected]
- Public Key Cryptography – Performance Comparison and Benchmarking
- Experimenting with Faults, Lattices and the DSA
- Efficient Forward-Secure and Compact Signatures for the Internet of Things (Iot)
- Schnorr Identification and Signatures
- Practical Group Signatures Without Random Oracles
- Provably Secure and Subliminal-Free Variant of Schnorr Signature Yinghui Zhang, Hui Li, Xiaoqing Li, Hui Zhu
- Durandal: a Rank Metric Based Signature Scheme
- The Security of DSA and ECDSA Bypassing the Standard Elliptic Curve Certification Scheme
- Schnorr Signature
- A CRYPTOGRAPHIC STUDY of SOME DIGITAL SIGNATURE SCHEMES a Thesis Submitted for the Partial Fulfillment of the Degree of Doctor of Philosophy in MATHEMATICS