↓ Skip to main content

Provable Security

Overview of attention for book
Cover of 'Provable Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Stronger Security of Authenticated Key Exchange
  3. Altmetric Badge
    Chapter 2 An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels
  4. Altmetric Badge
    Chapter 3 CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
  5. Altmetric Badge
    Chapter 4 Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
  6. Altmetric Badge
    Chapter 5 A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
  7. Altmetric Badge
    Chapter 6 Two Notes on the Security of Certificateless Signatures
  8. Altmetric Badge
    Chapter 7 A Provably Secure Ring Signature Scheme in Certificateless Cryptography
  9. Altmetric Badge
    Chapter 8 Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use
  10. Altmetric Badge
    Chapter 9 Does Secure Time-Stamping Imply Collision-Free Hash Functions?
  11. Altmetric Badge
    Chapter 10 Formal Proof of Provable Security by Game-Playing in a Proof Assistant
  12. Altmetric Badge
    Chapter 11 Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication
  13. Altmetric Badge
    Chapter 12 An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security
  14. Altmetric Badge
    Chapter 13 On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers
  15. Altmetric Badge
    Chapter 14 Practical Threshold Signatures Without Random Oracles
  16. Altmetric Badge
    Chapter 15 Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
  17. Altmetric Badge
    Chapter 16 Formal Security Treatments for Signatures from Identity-Based Encryption
  18. Altmetric Badge
    Chapter 17 Decryptable Searchable Encryption
Attention for Chapter 9: Does Secure Time-Stamping Imply Collision-Free Hash Functions?
Altmetric Badge

Mentioned by

wikipedia
1 Wikipedia page

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
20 Mendeley
connotea
1 Connotea
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Does Secure Time-Stamping Imply Collision-Free Hash Functions?
Chapter number 9
Book title
Provable Security
Published by
Springer Berlin Heidelberg, November 2007
DOI 10.1007/978-3-540-75670-5_9
Book ISBNs
978-3-54-075669-9, 978-3-54-075670-5
Authors

Ahto Buldas, Aivo Jürgenson, Buldas, Ahto, Jürgenson, Aivo

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 20 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 20 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 6 30%
Student > Master 5 25%
Lecturer 2 10%
Researcher 2 10%
Professor 1 5%
Other 2 10%
Unknown 2 10%
Readers by discipline Count As %
Computer Science 16 80%
Mathematics 1 5%
Physics and Astronomy 1 5%
Unknown 2 10%