-
1
-
-
0003508568
-
-
Federal Information Processing Standards Publication, U.S. Department of Commerce, National Bureau of Standards, Springfield (Virginia)
-
FIPS PUB 46. Data encryption standard. Federal Information Processing Standards Publication, U.S. Department of Commerce, National Bureau of Standards, Springfield (Virginia), 1977.
-
(1977)
FIPS PUB 46. Data Encryption Standard
-
-
-
7
-
-
0025508369
-
Network security via private-key certificates
-
D. Davis and R. Swick. Network security via private-key certificates. Operating Systems Review, 24:64-67, 1990.
-
(1990)
Operating Systems Review
, vol.24
, pp. 64-67
-
-
Davis, D.1
Swick, R.2
-
8
-
-
21344487320
-
Better login protocols for computer networks
-
B. Preneel, R. Govaerts, and J. Vandewalle, editors, Computer Security and Industrial Cryptography, Springer-Verlag
-
D. de Waleffe and J.-J. Quisquater. Better login protocols for computer networks. In B. Preneel, R. Govaerts, and J. Vandewalle, editors, Computer Security and Industrial Cryptography, volume 741 of Lecture Notes in Computer Science, pages 50-70. Springer-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.741
, pp. 50-70
-
-
De Waleffe, D.1
Quisquater, J.-J.2
-
10
-
-
0016092372
-
A user identification scheme not requiring secrecy in the computer
-
August
-
A. Evans Jr, W. Kantrowitz, and E. Weiss. A user identification scheme not requiring secrecy in the computer. Communications of the ACM, 17(8):437-442, August 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.8
, pp. 437-442
-
-
Evans Jr., A.1
Kantrowitz, W.2
Weiss, E.3
-
11
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A.M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, Springer-Verlag
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In A.M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, volume 263 of Lecture Notes in Computer Science, pages 186-194. Springer-Verlag, 1987.
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
12
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to password security
-
D. V. Klein. Foiling the cracker: a survey of, and improvements to password security. In Proc. of the 2nd USENIX Security Workshop, pages 5-14, 1990.
-
(1990)
Proc. of the 2nd USENIX Security Workshop
, pp. 5-14
-
-
Klein, D.V.1
-
16
-
-
0016090968
-
A high security log-in procedure
-
August
-
G.P. Purdy. A high security log-in procedure. Communications of the ACM, 17(8):442-445, August 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.8
, pp. 442-445
-
-
Purdy, G.P.1
-
17
-
-
0003602325
-
-
Internet Request for Comments RFC 1321, April
-
R. Rivest. The MD5 message digest algorithm. Internet Request for Comments RFC 1321, April 1992. Available at ftp://ds.internic.net/rfc/rfc1321.txt.
-
(1992)
The MD5 Message Digest Algorithm
-
-
Rivest, R.1
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
February
-
R.L. Rivest, A. Shamir, and L.M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
20
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
G.R. Blakley and D. Chaum, editors, Advances in Cryptology - Proceedings of CRYPTO 84, Springer-Verlag
-
A. Shamir. Identity-based cryptosystems and signature schemes. In G.R. Blakley and D. Chaum, editors, Advances in Cryptology - Proceedings of CRYPTO 84, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer-Verlag, 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
|