Author of the publication

Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems.

, , , and . J. Cryptology, 20 (4): 493-514 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Jarecki, Stanislaw
add a person with the name Jarecki, Stanislaw
 

Other publications of authors with the same name

Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity., , and . IACR Cryptology ePrint Archive, (2010)Password-Protected Secret Sharing., , , and . IACR Cryptology ePrint Archive, (2010)Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure., and . Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 172-187. Springer, (2005)Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection., and . TCC, volume 5444 of Lecture Notes in Computer Science, page 577-594. Springer, (2009)TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF., , , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 39-58. Springer, (2017)Identity-Based Aggregate and Multi-Signature Schemes Based on RSA., and . Public Key Cryptography, volume 6056 of Lecture Notes in Computer Science, page 480-498. Springer, (2010)Efficient Two-Party Secure Computation on Committed Inputs., and . EUROCRYPT, volume 4515 of Lecture Notes in Computer Science, page 97-114. Springer, (2007)A Signature Scheme as Secure as the Diffie-Hellman Problem., and . EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 401-415. Springer, (2003)OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks., , and . EUROCRYPT (3), volume 10822 of Lecture Notes in Computer Science, page 456-486. Springer, (2018)Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange., , , , , and . SCN, volume 11035 of Lecture Notes in Computer Science, page 485-504. Springer, (2018)