Sciweavers

ASIACRYPT
2004
Springer
14 years 6 months ago
On Provably Secure Time-Stamping Schemes
Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the underlying hash function is collisionresistant but still no rigorous proofs have...
Ahto Buldas, Märt Saarepera
ASIACRYPT
2004
Springer
14 years 6 months ago
On the Generalized Linear Equivalence of Functions Over Finite Fields
Luca Breveglieri, Alessandra Cherubini, Marco Macc...
ASIACRYPT
2004
Springer
14 years 6 months ago
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge
In the bare public-key model, introduced by Canetti et al. [STOC 2000], it is only assumed that each verifier deposits during a setup phase a public key in a file accessible by a...
Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Vis...