Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
44
views
14
references
Top references
cited by
38
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,805
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Public Key Cryptography - PKC 2005
A Verifiable Random Function with Short Proofs and Keys
other
Author(s):
Yevgeniy Dodis
,
Aleksandr Yampolskiy
Publication date
(Print):
2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Jaypee Brothers Medical Publishers: Covid-19
Most cited references
14
Record
: found
Abstract
: not found
Article
: not found
Fast Probabilistic Algorithms for Verification of Polynomial Identities
J. T. Schwartz
(1980)
0
comments
Cited
146
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Short Signatures Without Random Oracles
Dan Boneh
,
Xavier Boyen
(2004)
0
comments
Cited
129
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Lower Bounds for Discrete Logarithms and Related Problems
Victor Shoup
(1997)
0
comments
Cited
119
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2005
Pages
: 416-431
DOI:
10.1007/978-3-540-30580-4_28
SO-VID:
33e1007e-d421-455f-9db4-0ed74a294a82
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 275
Large Superfluous Keys in $\mathcal{M}\(ultivariate \)\mathcal{Q}$ uadratic Asymmetric Systems
pp. 154
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order
pp. 362
Improved Identity-Based Signcryption
pp. 380
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption
pp. 398
CBE from CL-PKE: A Generic Construction and Efficient Schemes
pp. 416
A Verifiable Random Function with Short Proofs and Keys
Similar content
5,805
External peer review of assessment: an effective approach to verifying standards?
Authors:
Jane Hudson
,
Margaret Price
,
Birgit den Outer
…
Clinical study to verify the effectiveness and safety of the modified isothymol or carvacrol compound against SARS-CoV-2 in COVID-19 patients
Authors:
RAUL OJEDA
How to Bypass Verified Boot Security in Chromium OS
Authors:
Lokesh Mandvekar
,
Chunming Qiao
,
Mohammad Husain
…
See all similar
Cited by
38
Practical Identity-Based Encryption Without Random Oracles
Authors:
Craig Gentry
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups
Authors:
Dan Boneh
,
Xavier Boyen
Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain
Authors:
Bernardo David
,
Peter Gaži
,
Aggelos Kiayias
…
See all cited by