Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
24
views
25
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,427
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — EUROCRYPT'98
Strengthened security for blind signatures
other
Author(s):
David Pointcheval
Publication date
(Online):
May 25 2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Most cited references
25
Record
: found
Abstract
: not found
Article
: not found
A method for obtaining digital signatures and public-key cryptosystems
R. L. Rivest
,
A Shamir
,
L Adleman
(1978)
0
comments
Cited
390
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
New directions in cryptography
W. Diffie
,
Chan Hellman
(1976)
0
comments
Cited
336
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Random oracles are practical
Mihir Bellare
,
Phillip Rogaway
(1993)
0
comments
Cited
163
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1998
Publication date (Online):
May 25 2006
Pages
: 391-405
DOI:
10.1007/BFb0054141
SO-VID:
95a0d38a-571a-47d0-a5aa-2fe2d20a38ae
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Securing threshold cryptosystems against chosen ciphertext attack
pp. 294
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption
pp. 32
A practical and provably secure scheme for publicly verifiable secret sharing and its applications
pp. 59
Breaking RSA may not be equivalent to factoring
pp. 72
Lower bounds on generic algorithms in groups
pp. 145
Optimum traitor tracing and asymmetric schemes
pp. 158
On finding small solutions of modular multivariate polynomial equations
pp. 221
Speeding up discrete log and factoring based schemes via precomputations
pp. 236
Fast batch verification for modular exponentiation and digital signatures
pp. 266
Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible
pp. 334
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
pp. 361
On the foundations of oblivious transfer
pp. 391
Strengthened security for blind signatures
pp. 406
Generic constructions for secure and efficient confirmer signature schemes
pp. 422
Security analysis of a practical “on the fly” authentication and signature generation
pp. 437
Universally verifiable mix-net with verification work independent of the number of mix-servers
pp. 448
A practical mix
pp. 475
Highly nonlinear balanced Boolean functions with a good correlation-immunity
pp. 489
Heuristic design of cryptographically strong balanced Boolean functions
pp. 512
Combinatorial bounds for broadcast encryption
pp. 561
Easy come — Easy go divisible cash
pp. 591
Optimistic fair exchange of digital signatures
Similar content
1,427
Pericytes from brain microvessels strengthen the barrier integrity in primary cultures of rat brain endothelial cells.
Authors:
Shinsuke Nakagawa
,
Mária A Deli
,
Shinobu Nakao
…
January 2025 California wildfires have been fueled by meteorological conditions strengthened by human-driven climate change
Authors:
Greta Cazzaniga
,
Davide Faranda
Strengthening health systems by health sector reforms
Authors:
Flavia Senkubuge
,
Moeketsi Modisenyane
,
Tewabech Bishaw
See all similar
Cited by
8
Efficient Blind and Partially Blind Signatures Without Random Oracles
Authors:
Tatsuaki Okamoto
Provably Secure Partially Blind Signatures
Authors:
Masayuki Abe
,
Tatsuaki Okamoto
Lattice-Based Blind Signatures
Authors:
Markus Rückert
See all cited by