4.4 Article

The random oracle model: a twenty-year retrospective

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Information Systems

How to Obfuscate Programs Directly

Joe Zimmerman

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II (2015)

Proceedings Paper Computer Science, Information Systems

Cryptanalysis of the Multilinear Map over the Integers

Jung Hee Cheon et al.

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I (2015)

Article Computer Science, Theory & Methods

ANOTHER LOOK AT SECURITY DEFINITIONS

Neal Koblitz et al.

ADVANCES IN MATHEMATICS OF COMMUNICATIONS (2013)

Article Computer Science, Hardware & Architecture

On the (Im)possibility of Obfuscating Programs

Boaz Barak et al.

JOURNAL OF THE ACM (2012)

Article Computer Science, Theory & Methods

High-speed high-security signatures

Daniel J. Bernstein et al.

JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2012)

Article Computer Science, Theory & Methods

Hash function requirements for Schnorr signatures

Gregory Neven et al.

JOURNAL OF MATHEMATICAL CRYPTOLOGY (2009)

Article Computer Science, Theory & Methods

Another look at provable security

Neal Koblitz et al.

JOURNAL OF CRYPTOLOGY (2007)

Article Computer Science, Theory & Methods

Another look at generic groups

Neal Koblitz et al.

ADVANCES IN MATHEMATICS OF COMMUNICATIONS (2007)

Article Computer Science, Hardware & Architecture

A fault attack on pairing-based cryptography

Daniel Page et al.

IEEE TRANSACTIONS ON COMPUTERS (2006)

Article Computer Science, Theory & Methods

Generic groups, collision resistance, and ECDSA

DRL Brown

DESIGNS CODES AND CRYPTOGRAPHY (2005)

Article Computer Science, Theory & Methods

The insecurity of the elliptic curve digital signature algorithm with partially known nonces

PQ Nguyen et al.

DESIGNS CODES AND CRYPTOGRAPHY (2003)

Article Computer Science, Theory & Methods

On the importance of eliminating errors in cryptographic computations

D Boneh et al.

JOURNAL OF CRYPTOLOGY (2001)

Article Computer Science, Theory & Methods

Security arguments for digital signatures and blind signatures

D Pointcheval et al.

JOURNAL OF CRYPTOLOGY (2000)