Loading…
Loading…
Relations among security notions for undeniable signature schemes
Get full text
Conference Proceeding
Loading…
Loading…
Lightweight email signatures
ADIDA, Ben, CHAU, David, HOHENBERGER, Susan, RIVEST, Ronald L
Published in Lecture notes in computer science (2006)
Get full text
Published in Lecture notes in computer science (2006)
Conference Proceeding
Loading…
Loading…
Get Shorty via Group Signatures without Encryption
Bichsel, Patrik, Camenisch, Jan, Neven, Gregory, Smart, Nigel P., Warinschi, Bogdan
Published in Security and Cryptography for Networks (2010)
Published in Security and Cryptography for Networks (2010)
Get full text
Book Chapter
Loading…
Loading…
On statistical testing of random numbers generators
EL HAJE, F, GOLUBEV, Y, LIARDET, P. Y, TEGLIA, Y
Published in Lecture notes in computer science (2006)
Get full text
Published in Lecture notes in computer science (2006)
Conference Proceeding
Loading…
Loading…
A new key exchange protocol based on MQV assuming public computations
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Ring Switching in BGV-Style Homomorphic Encryption
Gentry, Craig, Halevi, Shai, Peikert, Chris, Smart, Nigel P.
Published in Security and Cryptography for Networks (2012)
Published in Security and Cryptography for Networks (2012)
Get full text
Book Chapter