Academic literature on the topic 'Fiat-Shamir transform with aborts'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Fiat-Shamir transform with aborts.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Fiat-Shamir transform with aborts"
Cheon, Jung Hee, Hyeongmin Choe, Julien Devevey, et al. "HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 3 (2024): 25–75. http://dx.doi.org/10.46586/tches.v2024.i3.25-75.
Full textLinh, Võ Đình. "Xây dựng lược đồ chữ ký số an toàn từ các lược đồ định danh". Journal of Science and Technology on Information security 8, № 2 (2020): 27–33. http://dx.doi.org/10.54654/isj.v8i2.30.
Full textBrier, Éric, Houda Ferradi, Marc Joye, and David Naccache. "New number-theoretic cryptographic primitives." Journal of Mathematical Cryptology 14, no. 1 (2020): 224–35. http://dx.doi.org/10.1515/jmc-2019-0035.
Full textYe, Qing, Yongkang Lang, Zongqu Zhao, Qingqing Chen, and Yongli Tang. "Efficient Lattice-Based Ring Signature Scheme without Trapdoors for Machine Learning." Computational Intelligence and Neuroscience 2022 (September 19, 2022): 1–13. http://dx.doi.org/10.1155/2022/6547464.
Full textBellare, M., and S. Shoup. "Two-tier signatures from the Fiat–Shamir transform, with applications to strongly unforgeable and one-time signatures." IET Information Security 2, no. 2 (2008): 47. http://dx.doi.org/10.1049/iet-ifs:20070089.
Full textBellini, Emanuele, Chiara Marcolla, and Nadir Murru. "An Application of p-Fibonacci Error-Correcting Codes to Cryptography." Mathematics 9, no. 7 (2021): 789. http://dx.doi.org/10.3390/math9070789.
Full textAbdalla, Michel, Jee Hea An, Mihir Bellare, and Chanathip Namprempre. "From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security." IEEE Transactions on Information Theory 54, no. 8 (2008): 3631–46. http://dx.doi.org/10.1109/tit.2008.926303.
Full textZheng, Zhongxiang, Anyu Wang, and Lingyue Qin. "Rejection Sampling Revisit: How to Choose Parameters in Lattice-Based Signature." Mathematical Problems in Engineering 2021 (June 7, 2021): 1–12. http://dx.doi.org/10.1155/2021/9948618.
Full textLee, Youngkyung, Dong Hoon Lee, and Jong Hwan Park. "Revisiting NIZK-Based Technique for Chosen-Ciphertext Security: Security Analysis and Corrected Proofs." Applied Sciences 11, no. 8 (2021): 3367. http://dx.doi.org/10.3390/app11083367.
Full textUlitzsch, Vincent Quentin, Soundes Marzougui, Alexis Bagia, Mehdi Tibouchi, and Jean-Pierre Seifert. "Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP." IACR Transactions on Cryptographic Hardware and Embedded Systems, August 31, 2023, 367–92. http://dx.doi.org/10.46586/tches.v2023.i4.367-392.
Full textDissertations / Theses on the topic "Fiat-Shamir transform with aborts"
Fallahpour, Pouria. "Lattice-based cryptography in a quantum setting : security proofs and attacks." Electronic Thesis or Diss., Lyon, École normale supérieure, 2024. http://www.theses.fr/2024ENSL0023.
Full textBook chapters on the topic "Fiat-Shamir transform with aborts"
Devevey, Julien, Pouria Fallahpour, Alain Passelègue, and Damien Stehlé. "A Detailed Analysis of Fiat-Shamir with Aborts." In Advances in Cryptology – CRYPTO 2023. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38554-4_11.
Full textBambury, Henry, Hugo Beguinet, Thomas Ricosset, and Éric Sageloli. "Polytopes in the Fiat-Shamir with Aborts Paradigm." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68376-3_11.
Full textDas, Dipayan. "Fiat-Shamir with Aborts: From Identification Schemes to Linkable Ring Signatures." In Security, Privacy, and Applied Cryptography Engineering. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66626-2_9.
Full textLyubashevsky, Vadim. "Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures." In Advances in Cryptology – ASIACRYPT 2009. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10366-7_35.
Full textTan, Chik How, and Theo Fanuela Prabowo. "New Lattice-Based Signature Based on Fiat-Shamir Framework Without Aborts." In Cryptography, Codes and Cyber Security. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23201-5_4.
Full textFaust, Sebastian, Markulf Kohlweiss, Giorgia Azzurra Marson, and Daniele Venturi. "On the Non-malleability of the Fiat-Shamir Transform." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34931-7_5.
Full textBarbosa, Manuel, Gilles Barthe, Christian Doczkal, et al. "Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium." In Advances in Cryptology – CRYPTO 2023. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38554-4_12.
Full textLee, Ming Feng, Nigel P. Smart, and Bogdan Warinschi. "The Fiat–Shamir Transform for Group and Ring Signature Schemes." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15317-4_23.
Full textCiampi, Michele, and Yu Xia. "Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions." In Applied Cryptography and Network Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33491-7_21.
Full textCiampi, Michele, Giuseppe Persiano, Luisa Siniscalchi, and Ivan Visconti. "A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles." In Theory of Cryptography. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-49099-0_4.
Full text