-
1
-
-
0346596028
-
-
Atkins, D., Graff, M., Lenstra, A., Leyland, P., 1994. RSA-129. MIT Student Information Processing Board.
-
(1994)
RSA-129. MIT Student Information Processing Board
-
-
Atkins, D.1
Graff, M.2
Lenstra, A.3
Leyland, P.4
-
3
-
-
0013402235
-
Secure implementation of identification systems
-
Bengio, S., Brassard, G., Desmedt, Y.G., Goutier, C., Quisquater, J.J., 1991. Secure implementation of identification systems. J. Cryptol. 4 (3), 175-184.
-
(1991)
J. Cryptol.
, vol.4
, Issue.3
, pp. 175-184
-
-
Bengio, S.1
Brassard, G.2
Desmedt, Y.G.3
Goutier, C.4
Quisquater, J.J.5
-
4
-
-
84898945449
-
Multiprover interactive proofs: How to remove intractability assumptions
-
Ben-Or, M., Goldwasser, S., Kilian, J., Wigderson, A., 1988. Multiprover interactive proofs: How to remove intractability assumptions. In: Proceedings of the Twentieth STOC, pp. 113-131.
-
(1988)
Proceedings of the Twentieth STOC
, pp. 113-131
-
-
Ben-Or, M.1
Goldwasser, S.2
Kilian, J.3
Wigderson, A.4
-
5
-
-
84990834089
-
Efficient identification schemes using two prover interactive proofs
-
Springer, Berlin
-
Ben-Or, M., Goldwasser, S., Kilian, J., 1990. Efficient identification schemes using two prover interactive proofs. In: Advances in Cryptology - Proceedings of CRYPTO'89. Springer, Berlin, pp. 498-506.
-
(1990)
Advances in Cryptology - Proceedings of CRYPTO'89
, pp. 498-506
-
-
Ben-Or, M.1
Goldwasser, S.2
Kilian, J.3
-
6
-
-
85034644807
-
Efficient zero-knowledge identification schemes for smart cards
-
Springer, Berlin
-
Beth, T., 1989. Efficient zero-knowledge identification schemes for smart cards. In: Advances in Cryptology - Proceedings of EUROCRYPT'88. Springer, Berlin, pp. 77-84.
-
(1989)
Advances in Cryptology - Proceedings of EUROCRYPT'88
, pp. 77-84
-
-
Beth, T.1
-
7
-
-
85030309636
-
Identification tokens - Or: Solving the chess grandmaster problem
-
Springer, Berlin
-
Beth, T., Desmedt, Y.G., 1991. Identification tokens - or: Solving the chess grandmaster problem. In: Advances in Cryptology -Proceedings of CRYPTO'90. Springer, Berlin, pp. 169-178.
-
(1991)
Advances in Cryptology -Proceedings of CRYPTO'90
, pp. 169-178
-
-
Beth, T.1
Desmedt, Y.G.2
-
8
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
Brassard, G., Chaum, D., Crepeau, C., 1988. Minimum disclosure proofs of knowledge. J. Comput. System Sci. 37 (2), 156-189.
-
(1988)
J. Comput. System Sci.
, vol.37
, Issue.2
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crepeau, C.3
-
9
-
-
0026627555
-
A interactive identification scheme based on discrete logarithms and factoring
-
Brickell, E.F., McCurley, K.S., 1992. A interactive identification scheme based on discrete logarithms and factoring. J. Cryptol. 5, 29-39.
-
(1992)
J. Cryptol.
, vol.5
, pp. 29-39
-
-
Brickell, E.F.1
McCurley, K.S.2
-
10
-
-
0347856046
-
Efficient zero-knowledge identification schemes for smart cards
-
Burmester, B., Desmedt, Y., Beth, T., 1992. Efficient zero-knowledge identification schemes for smart cards. Comput. J. 35 (1), 21-29.
-
(1992)
Comput. J.
, vol.35
, Issue.1
, pp. 21-29
-
-
Burmester, B.1
Desmedt, Y.2
Beth, T.3
-
12
-
-
0347856044
-
Sharing a polynomial for password authentication
-
Chang, C.C., Liaw, H.T., 1989. Sharing a polynomial for password authentication. J. Comput. 1 (4), 11-17.
-
(1989)
J. Comput.
, vol.1
, Issue.4
, pp. 11-17
-
-
Chang, C.C.1
Liaw, H.T.2
-
13
-
-
0346596017
-
A new password authentication scheme
-
Chang, C.C., Wu, L.H., 1990a. A new password authentication scheme. J. Inform. Sci. Eng. 6, 139-147.
-
(1990)
J. Inform. Sci. Eng.
, vol.6
, pp. 139-147
-
-
Chang, C.C.1
Wu, L.H.2
-
15
-
-
0026153410
-
A remote password authentication with smart cards
-
Chang, C.C., Wu, T.C., 1991. A remote password authentication with smart cards. IEE Proc. E 138 (3), 165-168.
-
(1991)
IEE Proc. E
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
16
-
-
0345964588
-
A password authentication scheme based upon Diffie and Hellman's public key system
-
Chiayi, Taiwan, R.O.C.
-
Chang, C.C., Hwang, S.M., 1992. A password authentication scheme based upon Diffie and Hellman's public key system. In: The Second National Conference on Information Security, Chiayi, Taiwan, R.O.C., pp. 85-104.
-
(1992)
The Second National Conference on Information Security
, pp. 85-104
-
-
Chang, C.C.1
Hwang, S.M.2
-
17
-
-
0011869977
-
Correspondence for remote password authentication with smart cards
-
Chang, C.C., Laih, C.S., 1992. Correspondence for remote password authentication with smart cards. IEE Proc. E 139 (4), 372.
-
(1992)
IEE Proc. E
, vol.139
, Issue.4
, pp. 372
-
-
Chang, C.C.1
Laih, C.S.2
-
18
-
-
0001784609
-
Using smart cards to authenticate remote passwords
-
Chang, C.C., Hwang, S.J., 1993. Using smart cards to authenticate remote passwords. Comput. Math. Appl. 26 (7), 19-27.
-
(1993)
Comput. Math. Appl.
, vol.26
, Issue.7
, pp. 19-27
-
-
Chang, C.C.1
Hwang, S.J.2
-
19
-
-
0028405583
-
A remote password authentication scheme based upon ElGamal's signature scheme
-
Chang, C.C., Liao, W.Y., 1994. A remote password authentication scheme based upon ElGamal's signature scheme. Comput. Security 13, 137-144.
-
(1994)
Comput. Security
, vol.13
, pp. 137-144
-
-
Chang, C.C.1
Liao, W.Y.2
-
20
-
-
0347225875
-
Interactive remote login authentication scheme with smart cards
-
Taipei, Taiwan, R.O.C.
-
Chang, C.C., Wu, T.C., 1994. Interactive remote login authentication scheme with smart cards. In: The Fourth National Conference on Information Security, Taipei, Taiwan, R.O.C., pp. 151-156.
-
(1994)
The Fourth National Conference on Information Security
, pp. 151-156
-
-
Chang, C.C.1
Wu, T.C.2
-
21
-
-
84956869906
-
Demonstrating possession of a discrete logarithm without revealing it
-
Springer, Berlin
-
Chaum, D., Evertse, J.H., van de Graff, J., Peralta, R., 1987. Demonstrating possession of a discrete logarithm without revealing it. In: Advances in Cryptology - Proceedings of CRYPTO'86. Springer, Berlin, pp. 200-212.
-
(1987)
Advances in Cryptology - Proceedings of CRYPTO'86
, pp. 200-212
-
-
Chaum, D.1
Evertse, J.H.2
Van De Graff, J.3
Peralta, R.4
-
22
-
-
85023982750
-
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
-
Springer, Berlin
-
Chaum, D., Evertse, J.H., van de Graff, J., 1988. An improved protocol for demonstrating possession of discrete logarithms and some generalizations. In: Advances in Cryptology - Proceedings of EUROCRYPT'87. Springer, Berlin, pp. 127-141.
-
(1988)
Advances in Cryptology - Proceedings of EUROCRYPT'87
, pp. 127-141
-
-
Chaum, D.1
Evertse, J.H.2
Van De Graff, J.3
-
23
-
-
0345964589
-
-
FIPS Pub. 46, National Bureau of Standards, Washington, DC
-
Data Encryption Standard, 1977. FIPS Pub. 46, National Bureau of Standards, Washington, DC.
-
(1977)
-
-
-
25
-
-
0345964587
-
Major security problems with the 'Unforgeable' (Feige-) Fiat-Shamir proofs of identity and how to overcome them
-
SEDEP Paris, France
-
Desmedt, Y., 1988. Major security problems with the 'Unforgeable' (Feige-) Fiat-Shamir proofs of identity and how to overcome them. In: Proceedings of SECURICOM'88, Sixth Worldwide Congress on Computer and Communications Security and Protection, SEDEP Paris, France, pp. 147-159.
-
(1988)
Proceedings of SECURICOM'88, Sixth Worldwide Congress on Computer and Communications Security and Protection
, pp. 147-159
-
-
Desmedt, Y.1
-
26
-
-
85028745474
-
Special uses and abuses of the Fiat-Shamir passport protocol
-
Springer, Berlin
-
Desmedt, Y., Goutier, C., Bengio, S., 1988. Special uses and abuses of the Fiat-Shamir passport protocol. In: Advances in Cryptology -Proceedings of CRYPTO'87. Springer, Berlin, pp. 21-39.
-
(1988)
Advances in Cryptology -Proceedings of CRYPTO'87
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, C.2
Bengio, S.3
-
27
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., Hellman, M.E., 1976. New directions in cryptography. IEEE Trans. Inform. Theory IT 22 (6), 644-654.
-
(1976)
IEEE Trans. Inform. Theory IT
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
28
-
-
0016092372
-
A user authentication scheme not requiring secrecy in the computer
-
Evans, A., Jr., Kantrowitz, W., Weiss, E., 1974. A user authentication scheme not requiring secrecy in the computer. Commun. ACM 17 (8), 437-442.
-
(1974)
Commun. ACM
, vol.17
, Issue.8
, pp. 437-442
-
-
Evans A., Jr.1
Kantrowitz, W.2
Weiss, E.3
-
29
-
-
0024135240
-
Zero knowledge proofs of identity
-
Feige, U., Fiat, A., Shamir, A., 1988. Zero knowledge proofs of identity. J. Cryptol. 1 (2), 77-94.
-
(1988)
J. Cryptol.
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
30
-
-
0016579870
-
Some cryptography techniques for machine to machine data communications
-
Feistel, H., Notz, W.A., Smith, J.L., 1975. Some cryptography techniques for machine to machine data communications. Proc. IEEE 63 (11), 1545-1554.
-
(1975)
Proc. IEEE
, vol.63
, Issue.11
, pp. 1545-1554
-
-
Feistel, H.1
Notz, W.A.2
Smith, J.L.3
-
31
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Springer, Berlin
-
Fiat, A., Shamir, A., 1987a. How to prove yourself: Practical solutions to identification and signature problems. In: Advances in Cryptology - Proceedings of CRYPTO'86. Springer, Berlin, pp. 186-194.
-
(1987)
Advances in Cryptology - Proceedings of CRYPTO'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
33
-
-
0021941417
-
The knowledge complexity of interactive proof systems
-
Goldwasser, S., Micali, S., Rackoff, C., 1985. The knowledge complexity of interactive proof systems. In: Proceedings of the Seventeenth Annual ACM Symposium Theory of Computing, pp. 291-304.
-
(1985)
Proceedings of the Seventeenth Annual ACM Symposium Theory of Computing
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
34
-
-
84959165880
-
A critical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
Springer, Berlin
-
Guillou, L.C., Quisquater, J.J., 1989. A critical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In: Advances in Cryptology - Proceedings of EUROCRYPT'88. Springer, Berlin, pp. 123-128.
-
(1989)
Advances in Cryptology - Proceedings of EUROCRYPT'88
, pp. 123-128
-
-
Guillou, L.C.1
Quisquater, J.J.2
-
35
-
-
9444274735
-
How to time-stamp a digital document
-
Springer, Berlin
-
Haber, S., Stornetta, W.S., 1991. How to time-stamp a digital document. In: Advances in Cryptology - Proceedings of CRYPTO'90. Springer, Berlin, pp. 429-436.
-
(1991)
Advances in Cryptology - Proceedings of CRYPTO'90
, pp. 429-436
-
-
Haber, S.1
Stornetta, W.S.2
-
36
-
-
0024903684
-
Password authentication using public-key cryptography
-
Harn, L., Huand, D., Laih, C.S., 1989. Password authentication using public-key cryptography. Comput. Math. Appl. 18 (12), 1001-1017.
-
(1989)
Comput. Math. Appl.
, vol.18
, Issue.12
, pp. 1001-1017
-
-
Harn, L.1
Huand, D.2
Laih, C.S.3
-
38
-
-
0025877538
-
Non-interactive password authentications without password tables
-
Hong Kong
-
Hwang, T.L., Chen, Y.W., Laih, C.S., 1990. Non-interactive password authentications without password tables. In: IEEE Region 10 Conference on Computer and Communication Systems, Hong Kong.
-
(1990)
IEEE Region 10 Conference on Computer and Communication Systems
-
-
Hwang, T.L.1
Chen, Y.W.2
Laih, C.S.3
-
39
-
-
85028775577
-
Direct minimum knowledge computations
-
Springer, Berlin
-
Impagliazzo, R., Yung, M., 1988. Direct minimum knowledge computations. In: Advances in Cryptology - Proceedings of CRYPTO'87. Springer, Berlin, pp. 40-51.
-
(1988)
Advances in Cryptology - Proceedings of CRYPTO'87
, pp. 40-51
-
-
Impagliazzo, R.1
Yung, M.2
-
40
-
-
0024771499
-
A survey of password mechanisms: Weakness and potential improvements, Part 1
-
Jobusch, D.L., Oldhoeft, A.E., 1989a. A survey of password mechanisms: Weakness and potential improvements, Part 1. Comput. Security 8, 587-601.
-
(1989)
Comput. Security
, vol.8
, pp. 587-601
-
-
Jobusch, D.L.1
Oldhoeft, A.E.2
-
41
-
-
0024777503
-
A survey of password mechanisms: Weakness and potential improvements, Part 2
-
Jobusch, D.L., Oldhoeft, A.E., 1989b. A survey of password mechanisms: Weakness and potential improvements, Part 2. Comput. Security 8, 675-689.
-
(1989)
Comput. Security
, vol.8
, pp. 675-689
-
-
Jobusch, D.L.1
Oldhoeft, A.E.2
-
42
-
-
3342960338
-
Direct demonstration of the power to break public-key cryptosystems
-
Springer, Berlin
-
Koyama, K., 1991. Direct demonstration of the power to break public-key cryptosystems. In: Advances in Cryptology - Proceedings of AUSCRYPT'90. Springer, Berlin, pp. 14-21.
-
(1991)
Advances in Cryptology - Proceedings of AUSCRYPT'90
, pp. 14-21
-
-
Koyama, K.1
-
43
-
-
0038061940
-
Password authentication using quadratic residues
-
Taipei, Taiwan, R.O.C.
-
Lain, C.S., Harn, L., Huang, D., 1988. Password authentication using quadratic residues. In: Proceedings of the 1988 International Computer Symposium, Taipei, Taiwan, R.O.C., pp. 1484-1489.
-
(1988)
Proceedings of the 1988 International Computer Symposium
, pp. 1484-1489
-
-
Lain, C.S.1
Harn, L.2
Huang, D.3
-
44
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L., 1981. Password authentication with insecure communication. Comm. ACM 24 (11), 770-772.
-
(1981)
Comm. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
45
-
-
0019579253
-
Cryptographic authentication of time-invariant quantities
-
Lennon, R.E., Matyas, S.M., Meyer, C.H., 1981. Cryptographic authentication of time-invariant quantities. IEEE Trans. Commun. COM 29 (6), 773-777.
-
(1981)
IEEE Trans. Commun. COM
, vol.29
, Issue.6
, pp. 773-777
-
-
Lennon, R.E.1
Matyas, S.M.2
Meyer, C.H.3
-
46
-
-
0345964585
-
Password authentication schemes based on triangles and straight lines
-
Liaw, H.T., 1993. Password authentication schemes based on triangles and straight lines. Shin-Hsin News 3, 41-57.
-
(1993)
Shin-Hsin News
, vol.3
, pp. 41-57
-
-
Liaw, H.T.1
-
47
-
-
0037724292
-
Password authentication using a unit circle encryption
-
Liaw, H.T., 1995. Password authentication using a unit circle encryption. Cryptology, XIX (2), 198-208.
-
(1995)
Cryptology
, vol.19
, Issue.2
, pp. 198-208
-
-
Liaw, H.T.1
-
48
-
-
0347225871
-
Password authentication using Newton's interpolating polynomials
-
Lin, C.H., Chang, C.S., Wu, T.C., Lee, R.C.T., 1991. Password authentication using Newton's interpolating polynomials. Inform. Systems 16 (1), 97-102.
-
(1991)
Inform. Systems
, vol.16
, Issue.1
, pp. 97-102
-
-
Lin, C.H.1
Chang, C.S.2
Wu, T.C.3
Lee, R.C.T.4
-
49
-
-
85031775795
-
An improvement of the Fiat-Shamir identification and signature scheme
-
Springer, Berlin
-
Micali, S., Shamir, A., 1989. An improvement of the Fiat-Shamir identification and signature scheme. In: Advances in Cryptology - Proceedings of CRYPTO'88. Springer, Berlin, pp. 244-247.
-
(1989)
Advances in Cryptology - Proceedings of CRYPTO'88
, pp. 244-247
-
-
Micali, S.1
Shamir, A.2
-
50
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needhan, R.M., Schroeder, M.D., 1978. Using encryption for authentication in large networks of computers. Commun. ACM 21 (12), 993-999.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needhan, R.M.1
Schroeder, M.D.2
-
51
-
-
0024053244
-
Pratical extension of Fiat-Shamir scheme
-
Ohta, K., Okamoto, T., 1988. Pratical extension of Fiat-Shamir scheme. Electron. Lett. 24 (15), 955-956.
-
(1988)
Electron. Lett.
, vol.24
, Issue.15
, pp. 955-956
-
-
Ohta, K.1
Okamoto, T.2
-
52
-
-
0004794571
-
A modification of the Fiat-Shamir scheme
-
Springer, Berlin
-
Ohta, K., Okamoto, T., 1989. A modification of the Fiat-Shamir scheme. In: Advances in Cryptology - Proceedings of CRYPTO'88. Springer, Berlin, pp. 232-243.
-
(1989)
Advances in Cryptology - Proceedings of CRYPTO'88
, pp. 232-243
-
-
Ohta, K.1
Okamoto, T.2
-
53
-
-
0346596016
-
Survey of passwords
-
Taipei, Taiwan, R.O.C.
-
Piller, E., 1988. Survey of passwords. In: Proceedings of the 1988 International Computer Symposium, Taipei, Taiwan, R.O.C., pp. 1478-1483.
-
(1988)
Proceedings of the 1988 International Computer Symposium
, pp. 1478-1483
-
-
Piller, E.1
-
54
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(P) and its cryptographic significance
-
Pohlig, S.C., Hellman, M.E., 1978. An improved algorithm for computing logarithms over GF(P) and its cryptographic significance. IEEE Trans. Inform. Theory IT 24 (1), 106-110.
-
(1978)
IEEE Trans. Inform. Theory IT
, vol.24
, Issue.1
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
55
-
-
0016090968
-
A high security login procedure
-
Purdy, G.B., 1974. A high security login procedure. Commun. ACM 17 (8), 442-445.
-
(1974)
Commun. ACM
, vol.17
, Issue.8
, pp. 442-445
-
-
Purdy, G.B.1
-
56
-
-
0346596015
-
COSAIR, a chip card with fast RSa capability
-
Austria, 19-20
-
Quisquarter, J.J., de Waleffe, D., Bournas, J.P., 1987. COSAIR, a chip card with fast RSA capability. In: SMART CARD 2000: The future of IC Cards, Proceedings of IFIP WG 11.6 International Conference, Austria, 19-20.
-
(1987)
SMART CARD 2000: the Future of IC Cards, Proceedings of IFIP WG 11.6 International Conference
-
-
Quisquarter, J.J.1
De Waleffe, D.2
Bournas, J.P.3
-
57
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L., 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21 (2), 120-126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
58
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Springer, Berlin
-
Schnorr, C.P., 1990. Efficient identification and signatures for smart cards. In: Advances in Cryptology - Proceedings of CRYPTO'89. Springer, Berlin, pp. 239-252.
-
(1990)
Advances in Cryptology - Proceedings of CRYPTO'89
, pp. 239-252
-
-
Schnorr, C.P.1
-
59
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
Springer, Berlin
-
Shamir, A., 1985. Identity based cryptosystems and signature schemes. In: Advances in Cryptology - Proceedings of CRYPTO'84. Springer, Berlin, pp. 47-53.
-
(1985)
Advances in Cryptology - Proceedings of CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
60
-
-
0025840878
-
A dynamic password authentication method using a one-way function
-
Shimizu, A., 1991. A dynamic password authentication method using a one-way function. System Comput. Japan 22 (7), 32-40.
-
(1991)
System Comput. Japan
, vol.22
, Issue.7
, pp. 32-40
-
-
Shimizu, A.1
-
61
-
-
0021939027
-
On improvements to password security
-
Singh, K., 1985. On improvements to password security. Oper. System Rev. 19 (1), 53-60.
-
(1985)
Oper. System Rev.
, vol.19
, Issue.1
, pp. 53-60
-
-
Singh, K.1
-
62
-
-
0040545605
-
The future is in the PC cards
-
Sternaglass, D., 1992. The future is in the PC cards. IEEE Spectrum 29 (6), 46-50.
-
(1992)
IEEE Spectrum
, vol.29
, Issue.6
, pp. 46-50
-
-
Sternaglass, D.1
-
64
-
-
0347767593
-
SmartCards: Smarter than passwords
-
Wood, L., 1991. SmartCards: Smarter than passwords. Datamation 37 (14), 69-70.
-
(1991)
Datamation
, vol.37
, Issue.14
, pp. 69-70
-
-
Wood, L.1
-
65
-
-
0347856037
-
Noninteractive remote login authentication based on factoring and discrete logarithms
-
Taipei, Taiwan, R.O.C.
-
Wu, T.C., He, W.H., 1994. Noninteractive remote login authentication based on factoring and discrete logarithms. In: The Fourth National Conference on Information Security, Taipei, Taiwan, R.O.C., pp. 157-172.
-
(1994)
The Fourth National Conference on Information Security
, pp. 157-172
-
-
Wu, T.C.1
He, W.H.2
|