Lower bounds for the signature size of incremental schemes
暂无分享,去创建一个
[1] Daniele Micciancio,et al. Oblivious data structures: applications to cryptography , 1997, STOC '97.
[2] Reuven Bar-Yehuda,et al. Privacy, additional information and communication , 1993, IEEE Trans. Inf. Theory.
[3] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[4] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[5] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[6] Alexander A. Razborov,et al. On the Distributional Complexity of Disjointness , 1992, Theor. Comput. Sci..
[7] Bala Kalyanasundaram,et al. The Probabilistic Communication Complexity of Set Intersection , 1992, SIAM J. Discret. Math..
[8] Eyal Kushilevitz,et al. Communication Complexity , 1997, Adv. Comput..
[9] Andrew Chi-Chih Yao,et al. Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.
[10] Marc Fischlin. Incremental Cryptography and Memory Checkers , 1997, EUROCRYPT.
[11] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[12] Birgit Pfitzmann,et al. Fail-Stop Signatures , 1997, SIAM J. Comput..
[13] Mihir Bellare,et al. Incremental cryptography and application to virus protection , 1995, STOC '95.
[14] Eyal Kushilevitz,et al. Private Computations over the Integers , 1995, SIAM J. Comput..
[15] Mihir Bellare,et al. Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.
[16] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1967 .
[17] Eyal Kushilevitz,et al. Privacy and communication complexity , 1989, 30th Annual Symposium on Foundations of Computer Science.