Fischlin, 2003
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| CA1321649C (en) | Method and system for authentication | |
| US6701434B1 (en) | Efficient hybrid public key signature scheme | |
| Boldyreva et al. | Secure proxy signature schemes for delegation of signing rights | |
| US7698736B2 (en) | Secure delegation using public key authentication | |
| US8667283B2 (en) | Soft message signing | |
| US6826687B1 (en) | Commitments in signatures | |
| Liu et al. | Two-pass authenticated key exchange with explicit authentication and tight security | |
| US20110271109A1 (en) | Systems and methods of remote device authentication | |
| CN114117547B (en) | SM9 digital signature acceleration generation method and digital signature acceleration verification method based on pre-calculation table | |
| EP0374225B1 (en) | Method and device for authentication | |
| Drake et al. | Hash-based multi-signatures for post-quantum ethereum | |
| CN115694822A (en) | Verification method, device and system, equipment and medium based on zero-knowledge proof | |
| Eaton et al. | Security analysis of signature schemes with key blinding | |
| CN116170228A (en) | Authentication method, device, storage medium and equipment for terminal identification equipment | |
| Adjedj et al. | Two-Round 2PC ECDSA at the Cost of 1 OLE | |
| CN112184245B (en) | Transaction identity confirmation method and device for cross-region block chain | |
| Endignoux | Design and implementation of a post-quantum hash-based cryptographic signature scheme | |
| Fischlin | Progressive verification: The case of message authentication | |
| Fischlin et al. | Post-quantum Security for the Extended Access Control Protocol | |
| Page | The application of hash chains and hash structures to cryptography | |
| Wang et al. | Security remarks on a convertible nominative signature scheme | |
| Mehjabin et al. | PAMA: PUF-based Aggregated Multi-hop Attestation Protocol for IoT | |
| Katz | Digital signatures: Background and definitions | |
| CN114640475B (en) | Decentralized identity authentication method and device, computer equipment and storage medium | |
| Biswas et al. | Multi-key fully-homomorphic aggregate MAC for arithmetic circuits |