The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- 1 January 1996
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- p. 399-416
- https://doi.org/10.1007/3-540-68339-9_34
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and IdentifiersPublished by RFC Editor ,1993
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- The development of the number field sieveLecture Notes in Mathematics, 1993
- How to sign given any trapdoor permutationJournal of the ACM, 1992
- One-way functions are necessary and sufficient for secure signaturesPublished by Association for Computing Machinery (ACM) ,1990
- Universal one-way hash functions and their cryptographic applicationsPublished by Association for Computing Machinery (ACM) ,1989
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- A modification of the RSA public-key encryption procedure (Corresp.)IEEE Transactions on Information Theory, 1980
- New directions in cryptographyIEEE Transactions on Information Theory, 1976