Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Abdalla, Michel Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 2 of 2 reviews    
  Tightly secure signatures from lossy identification schemes
Abdalla M., Fouque P., Lyubashevsky V., Tibouchi M.  Journal of Cryptology 29(3): 597-631, 2016. Type: Article

The authors have done a great job in presenting a potentially high-impact work. The paper studies signature schemes that are secure in the random oracle model, particularly those based on the Fiat-Shamir (heuristic) technique....
...
Sep 7 2016  
  Key management for restricted multicast using broadcast encryption
Abdalla M., Shavitt Y., Wool A.  IEEE/ACM Transactions on Networking 8(4): 443-454, 2000. Type: Article

Pay-per-view is one of several applications that require efficient key management in the context of encrypting broadcast transmissions in order to implement selectively restricted multicast operations sent over an insecure channel. Since informati...
...
Feb 1 2001  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy