Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A digital signature scheme secure against adaptive chosen-message attacks

Published: 01 April 1988 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2025)Improving efficiency and security of Camenisch–Lysyanskaya signatures for anonymous credential systemsComputer Standards & Interfaces10.1016/j.csi.2024.10388691:COnline publication date: 1-Jan-2025
  • (2024)DSigProceedings of the 18th USENIX Conference on Operating Systems Design and Implementation10.5555/3691938.3691974(667-685)Online publication date: 10-Jul-2024
  • (2024)Provably-Secure One-Message Unilateral Entity Authentication SchemesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.328847321:4(1665-1679)Online publication date: 1-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image SIAM Journal on Computing
SIAM Journal on Computing  Volume 17, Issue 2
Special issue on cryptography
April 1988
248 pages

Publisher

Society for Industrial and Applied Mathematics

United States

Publication History

Published: 01 April 1988

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Improving efficiency and security of Camenisch–Lysyanskaya signatures for anonymous credential systemsComputer Standards & Interfaces10.1016/j.csi.2024.10388691:COnline publication date: 1-Jan-2025
  • (2024)DSigProceedings of the 18th USENIX Conference on Operating Systems Design and Implementation10.5555/3691938.3691974(667-685)Online publication date: 10-Jul-2024
  • (2024)Provably-Secure One-Message Unilateral Entity Authentication SchemesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.328847321:4(1665-1679)Online publication date: 1-Jul-2024
  • (2024)Towards tightly secure short linearly homomorphic signaturesTheoretical Computer Science10.1016/j.tcs.2024.1147581014:COnline publication date: 27-Oct-2024
  • (2024)Redactable consortium blockchain based on verifiable distributed chameleon hash functionsJournal of Parallel and Distributed Computing10.1016/j.jpdc.2023.104777183:COnline publication date: 1-Jan-2024
  • (2024)New tag-based signatures and their applications on linearly homomorphic signaturesComputer Standards & Interfaces10.1016/j.csi.2023.10380488:COnline publication date: 1-Mar-2024
  • (2024)To pass or not to passComputers and Security10.1016/j.cose.2023.103566136:COnline publication date: 1-Feb-2024
  • (2024)Formal Analysis of Julia Key Agreement ProtocolInformation and Communications Security10.1007/978-981-97-8801-9_9(171-190)Online publication date: 27-Aug-2024
  • (2024)Extended Withdrawable SignatureData Security and Privacy Protection10.1007/978-981-97-8540-7_8(119-140)Online publication date: 25-Oct-2024
  • (2024)Threshold Signatures with Private Accountability via Secretly Designated WitnessesInformation Security and Privacy10.1007/978-981-97-5025-2_20(389-407)Online publication date: 15-Jul-2024
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media