From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security.
Michel AbdallaJee Hea AnMihir BellareChanathip NampremprePublished in: IACR Cryptol. ePrint Arch. (2002)
Keyphrases
- intrusion detection
- access control
- information security
- computer security
- security requirements
- information assurance
- statistical databases
- data security
- security policies
- security issues
- network security
- data integrity
- security systems
- security problems
- security threats
- security vulnerabilities
- wavelet transform
- cryptographic protocols