Forward-Security in Private-Key Cryptography
- 28 February 2003
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- The Security of the Cipher Block Chaining Message Authentication CodeJournal of Computer and System Sciences, 2000
- Simple forward-secure signatures from any signature schemePublished by Association for Computing Machinery (ACM) ,2000
- Advances in Cryptology — CRYPTO 2000Lecture Notes in Computer Science, 2000
- Keying Hash Functions for Message AuthenticationLecture Notes in Computer Science, 1996
- Threshold cryptographyEuropean Transactions on Telecommunications, 1994
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- How to construct random functionsJournal of the ACM, 1986
- A Simple Unpredictable Pseudo-Random Number GeneratorSIAM Journal on Computing, 1986
- How to Generate Cryptographically Strong Sequences of Pseudorandom BitsSIAM Journal on Computing, 1984
- Theory and application of trapdoor functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982