Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
65
views
7
references
Top references
cited by
77
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,075
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — EUROCRYPT ’96
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
other
Author(s):
Mihir Bellare
,
Phillip Rogaway
Publication date
(Online):
July 13 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Digital Archaeology
Most cited references
7
Record
: found
Abstract
: not found
Report
: not found
The MD5 Message-Digest Algorithm
R. Rivest
(1992)
0
comments
Cited
165
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Universal one-way hash functions and their cryptographic applications
M. Yung
,
M Naor
(1989)
0
comments
Cited
100
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
One-way functions are necessary and sufficient for secure signatures
J. Rompel
(1990)
0
comments
Cited
69
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1996
Publication date (Online):
July 13 2001
Pages
: 399-416
DOI:
10.1007/3-540-68339-9_34
SO-VID:
8b9ba405-ebb6-4610-99ab-c1b8b132a988
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Low-Exponent RSA with Related Messages
pp. 10
Generating EIGamal Signatures Without Knowing the Secret Key
pp. 19
On the Security of Two MAC Algorithms
pp. 72
Multi-Authority Secret-Ballot Elections with Linear Work
pp. 84
Asymmetric Fingerprinting
pp. 143
Designated Verifier Proofs and Their Applications
pp. 155
Finding a Small Root of a Univariate Modular Equation
pp. 178
Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known
pp. 190
Publicly Verifiable Secret Sharing
pp. 212
The Security of the Gabidulin Public Key Cryptosystem
pp. 224
Non-Linear Approximations in Linear Cryptanalysis
pp. 245
An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding
pp. 307
Foiling Birthday Attacks in Length-Doubling Transformations
pp. 332
On Diffie-Hellman Key Agreement with Short Exponents
pp. 344
On the Security of a Practical Identification Scheme
pp. 354
Robust Threshold DSS Signatures
pp. 399
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
Similar content
2,075
Efficient Construction of Simultaneous Deterministic Finite Automata on Multicores Using Rabin Fingerprints
Authors:
Minyoung Jung
,
Bernd Burgstaller
,
Johann Blieberger
Towards a Novel Generalized Chinese Remainder Algorithm for Extended Rabin Cryptosystem
Authors:
Justin Zhan
,
Peter Shiue
,
Shen Huang
…
Las barreras de acceso a los servicios de salud en la población indígena de Rabinal en Guatemala
Authors:
M. Hautecoeur
,
MV Zunzunegui
,
B Vissandjée
See all similar
Cited by
77
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups
Authors:
Dan Boneh
,
Xavier Boyen
Homomorphic Signature Schemes
Authors:
Robert Johnson
,
David Molnar
,
Dawn Song
…
Secure Hash-and-Sign Signatures Without the Random Oracle
Authors:
Rosario Gennaro
,
Shai Halevi
,
Tal Rabin
See all cited by