On Randomizing Hash Functions to Strengthen the Security of Digital Signatures.
Praveen GauravaramLars R. KnudsenPublished in: EUROCRYPT (2009)
Keyphrases
- hash functions
- digital signature
- security mechanisms
- key management
- signature scheme
- public key
- secret key
- encryption scheme
- private key
- smart card
- data integrity
- provably secure
- security issues
- elliptic curve
- authentication protocol
- blind signature scheme
- security analysis
- information security
- security model
- block cipher
- security requirements
- similarity search
- access control
- resource constrained
- security protocols
- standard model
- data storage
- network security
- operating system
- wireless sensor networks
- database systems
- data sets
- database
- rfid tags
- ad hoc networks
- data distribution
- intrusion detection