1 |
H. Krawczyk and H. Wee, "The OPTLS Protocol and TLS 1.3," IEEE EuroS&P'16, pp. 81-96, Mar. 2016
|
2 |
H. Krawczyk, K. G. Paterson, and H. Wee, "On the security of the TLS Protocol: a systematic analysis," CRYPTO'13, LNCS vol. 8042, pp. 429-448, Aug. 2013
|
3 |
M. Bellare and T. Ristov, "A characterization of chameleon hash functions and new, efficient designs," Journal of Cryptology, vol. 27, pp. 799-823, Oct. 2014
DOI
|
4 |
A. Shamir and Y. Tauman, "Improved on-line/off-line signature schemes," CRYPTO'01, LNCS vol. 2139, pp. 355-367. Aug. 2001
|
5 |
M. Bellare and P. Rogaway, "Random oracles are practical: a paradigm for designing efficient protocols," ACM-CCS'93, pp. 62-73. Nov. 1993
|
6 |
M. Bellare and P. Rogaway, "The exact security of digital signature-how to sign with RSA and Rabin," Eurocrypt'96, LNCS vol. 1070, pp. 399-416. May. 1996
|
7 |
M. Joye, "An efficient on-line/off-line signature scheme without random oracles," CANS'08, LNCS vol. 5339, pp. 98-107. Dec. 2008
|
8 |
S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen message attacks," SIAM Journal of Computing, vol. 17(2), pp. 281-308, Apr. 1988
DOI
|
9 |
X. Boyen, "A tapestry of identity based encryption: practical frameworks compared", International Journal of Applied Cryptography, vol. 1(1), pp. 3-21, Feb. 2008
DOI
|
10 |
M. Bellare, C. Namprempre, and G. Neven, "Security proofs for identity-based identification and signature schemes," Journal of Cryptology, vol. 22(1), pp. 1-61, Jan. 2009
DOI
|
11 |
S. Even, O. Goldreich, and S. Micali, "On-line/off-line digital signatures," CRYPTO'89, LNCS vol. 435, pp. 263-275, Aug. 1989
|