Journal articles on the topic 'Fiat-Shamir transform with aborts'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 17 journal articles for your research on the topic 'Fiat-Shamir transform with aborts.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Cheon, Jung Hee, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, Markus Krausz, Georg Land, Marc Möller, Damien Stehlé, and MinJune Yi. "HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 3 (July 18, 2024): 25–75. http://dx.doi.org/10.46586/tches.v2024.i3.25-75.
Full textLinh, Võ Đình. "Xây dựng lược đồ chữ ký số an toàn từ các lược đồ định danh." Journal of Science and Technology on Information security 8, no. 2 (April 9, 2020): 27–33. http://dx.doi.org/10.54654/isj.v8i2.30.
Full textBrier, Éric, Houda Ferradi, Marc Joye, and David Naccache. "New number-theoretic cryptographic primitives." Journal of Mathematical Cryptology 14, no. 1 (August 1, 2020): 224–35. http://dx.doi.org/10.1515/jmc-2019-0035.
Full textYe, Qing, Yongkang Lang, Zongqu Zhao, Qingqing Chen, and Yongli Tang. "Efficient Lattice-Based Ring Signature Scheme without Trapdoors for Machine Learning." Computational Intelligence and Neuroscience 2022 (September 19, 2022): 1–13. http://dx.doi.org/10.1155/2022/6547464.
Full textBellare, M., and S. Shoup. "Two-tier signatures from the Fiat–Shamir transform, with applications to strongly unforgeable and one-time signatures." IET Information Security 2, no. 2 (2008): 47. http://dx.doi.org/10.1049/iet-ifs:20070089.
Full textBellini, Emanuele, Chiara Marcolla, and Nadir Murru. "An Application of p-Fibonacci Error-Correcting Codes to Cryptography." Mathematics 9, no. 7 (April 6, 2021): 789. http://dx.doi.org/10.3390/math9070789.
Full textAbdalla, Michel, Jee Hea An, Mihir Bellare, and Chanathip Namprempre. "From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security." IEEE Transactions on Information Theory 54, no. 8 (August 2008): 3631–46. http://dx.doi.org/10.1109/tit.2008.926303.
Full textZheng, Zhongxiang, Anyu Wang, and Lingyue Qin. "Rejection Sampling Revisit: How to Choose Parameters in Lattice-Based Signature." Mathematical Problems in Engineering 2021 (June 7, 2021): 1–12. http://dx.doi.org/10.1155/2021/9948618.
Full textLee, Youngkyung, Dong Hoon Lee, and Jong Hwan Park. "Revisiting NIZK-Based Technique for Chosen-Ciphertext Security: Security Analysis and Corrected Proofs." Applied Sciences 11, no. 8 (April 8, 2021): 3367. http://dx.doi.org/10.3390/app11083367.
Full textUlitzsch, Vincent Quentin, Soundes Marzougui, Alexis Bagia, Mehdi Tibouchi, and Jean-Pierre Seifert. "Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP." IACR Transactions on Cryptographic Hardware and Embedded Systems, August 31, 2023, 367–92. http://dx.doi.org/10.46586/tches.v2023.i4.367-392.
Full textZhang, Pingyuan, Han Jiang, Zhihua Zheng, Hao Wang, and Qiuliang Xu. "A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort." Computer Journal, May 31, 2021. http://dx.doi.org/10.1093/comjnl/bxab074.
Full textChaudhary, Dharminder, M. S. P. Durgarao, Dheerendra Mishra, and Saru Kumari. "A module lattice based construction of post quantum secure blockchain architecture." Transactions on Emerging Telecommunications Technologies, September 12, 2023. http://dx.doi.org/10.1002/ett.4855.
Full textChen, Yi-Hsiu, and Yehuda Lindell. "Optimizing and Implementing Fischlin's Transform for UC-Secure Zero Knowledge." IACR Communications in Cryptology, July 8, 2024. http://dx.doi.org/10.62056/a66chey6b.
Full textFesenko, Andrii, and Yuliia Lytvynenko. "Cryptanalysis of the «Vershyna» digital signature algorithm." Theoretical and Applied Cybersecurity 5, no. 2 (November 6, 2023). http://dx.doi.org/10.20535/tacs.2664-29132023.2.288499.
Full textBoudgoust, Katharina, and Adeline Roux-Langlois. "Overfull: Too Large Aggregate Signatures Based on Lattices." Computer Journal, March 17, 2023. http://dx.doi.org/10.1093/comjnl/bxad013.
Full textJurkiewicz, Mariusz. "Quantum-Resistant Forward-Secure Digital Signature Scheme Based on q-ary Lattices." Journal of Telecommunications and Information Technology, June 10, 2024, 90–103. http://dx.doi.org/10.26636/jtit.2024.2.1581.
Full textSHEİKHİ GARJAN, Maryam, N. Gamze ORHON KILIÇ, and Murat CENK. "Supersingular Isogeny-based Ring Signature." International Journal of Information Security Science, January 29, 2023. http://dx.doi.org/10.55859/ijiss.1187756.
Full text