共 50 条
- [1] On Signatures with Tight Security in the Multi-User Setting PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 91 - 95
- [2] Signatures with Tight Multi-user Security from Search Assumptions COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 485 - 504
- [3] Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022, 2022, 13269 : 626 - 642
- [5] On the Multi-user Security of Short Schnorr Signatures with Preprocessing ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 614 - 643
- [6] Security of BLS and BGLS signatures in a multi-user setting CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (01): : 41 - 58
- [7] Security of BLS and BGLS signatures in a multi-user setting Cryptography and Communications, 2018, 10 : 41 - 58
- [8] Tight Multi-user Security of Ascon and Its Large Key Extension INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 57 - 76
- [9] The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1429 - 1440
- [10] Almost Tight Multi-user Security Under Adaptive Corruptions & Leakages in the Standard Model ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT III, 2023, 14006 : 132 - 162