Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Ereth, Sarah"'
Autor:
Buchmann, Johannes, Dahmen, Erik, Ereth, Sarah, Hülsing, Andreas, Rückert, Markus, Nitaj, A., Pointcheval, D.
Publikováno v:
Progress in Cryptology – AFRICACRYPT 2011: 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011 Proceedings, 363-378
STARTPAGE=363;ENDPAGE=378;TITLE=Progress in Cryptology – AFRICACRYPT 2011
Lecture Notes in Computer Science ISBN: 9783642219689
AFRICACRYPT
STARTPAGE=363;ENDPAGE=378;TITLE=Progress in Cryptology – AFRICACRYPT 2011
Lecture Notes in Computer Science ISBN: 9783642219689
AFRICACRYPT
We show that the Winternitz one-time signature scheme is existentially unforgeable under adaptive chosen message attacks when instantiated with a family of pseudo random functions. Compared to previous results, which require a collision resistant has
Autor:
Harvan, Matúš, Basin, David A., Caronni, Germano, Ereth, Sarah, Klaedtke, Felix, Mantel, Heiko
Publikováno v:
Technical report / Department of Computer Science, 791
It is a growing concern of companies and end users whether the agents of an IT system, i.e., its processes and users, comply with security policies, which, e.g., stipulate how sensitive data must and must not be used by the agents. We present a scala
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5a7b181625a679d415d92227e9b3df2f
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Runtime Verification: 5th International Conference, RV 2014, Toronto, ON, Canada, September 22-25, 2014. Proceedings; 2014, p31-47, 17p
Publikováno v:
IT: Information Technology; Dec2014, Vol. 56 Issue 6, p288-293, 6p
Publikováno v:
International Journal of Applied Cryptography; January 2013, Vol. 3 Issue: 1 p84-96, 13p