-
1
-
-
84958769452
-
-
Advances in CryptologyCRYPTO'90, Lecture Notes in Computer Science 537, Springer-Verlag, pp.189-205, 1991.
-
J. Boyar, D. Chaum, I. Damgard, and T. Pedersen, "Convertible undeniable signatures," Advances in CryptologyCRYPTO'90, Lecture Notes in Computer Science 537, Springer-Verlag, pp.189-205, 1991.
-
D. Chaum, I. Damgard, and T. Pedersen, "Convertible Undeniable Signatures,"
-
-
Boyar, J.1
-
2
-
-
85027178972
-
-
Advances in Cryptology-CRYPTO'89, Lecture Notes in Computer Science 435, pp.212-21G, Springer-Verlag, 1990.
-
D. Chaum and H. van Antwerpen, "Undeniable signatures," Advances in Cryptology-CRYPTO'89, Lecture Notes in Computer Science 435, pp.212-21G, Springer-Verlag, 1990.
-
And H. Van Antwerpen, "Undeniable Signatures,"
-
-
Chaum, D.1
-
3
-
-
85043778396
-
-
Advances in Cryptology-EUROCRYPT'90, Lecture Notes in Computer Science 473, pp.458-464, Springer-Verlag, 1991.
-
D. Chaum, "Zero-knowledge undeniable signatures," Advances in Cryptology-EUROCRYPT'90, Lecture Notes in Computer Science 473, pp.458-464, Springer-Verlag, 1991.
-
"Zero-knowledge Undeniable Signatures,"
-
-
Chaum, D.1
-
4
-
-
84948970342
-
-
Advances in Cryptology-EUROCRYPT '94, Lecture Notes in Computer Science 950, pp.86-91, Springer-Verlag, 1994.
-
D. Chaum, "Designated confirmer signatures," Advances in Cryptology-EUROCRYPT '94, Lecture Notes in Computer Science 950, pp.86-91, Springer-Verlag, 1994.
-
"Designated Confirmer Signatures,"
-
-
Chaum, D.1
-
5
-
-
84934275826
-
-
Electronics Letters, vol.30, no.15, pp.1212-1213, July 1994.
-
P. Horster, M. Michels, and H. Petersen, "Authenticated encryption schemes with low communication costs," Electronics Letters, vol.30, no.15, pp.1212-1213, July 1994.
-
M. Michels, and H. Petersen, "Authenticated Encryption Schemes with Low Communication Costs,"
-
-
Horster, P.1
-
6
-
-
85027096001
-
-
1996 Symposium on Cryptography and Information Security, number 2C in SCIS '96, Technical Group on Information Security (IEICE), 1996.
-
A. Miyaji, "Strengthened message recovery signature scheme," 1996 Symposium on Cryptography and Information Security, number 2C in SCIS '96, Technical Group on Information Security (IEICE), 1996.
-
"Strengthened Message Recovery Signature Scheme,"
-
-
Miyaji, A.1
-
7
-
-
84948973239
-
-
Advances in Cryptology-Proceedings of Eurocrypt '94, Lecture Notes in Computer Science 950, pp.182-193, SpringerVerlag, 1995.
-
K. Nyberg and R.A. Rueppel, "Message recovery for signature schemes based on the discrete logarithm problem," Advances in Cryptology-Proceedings of Eurocrypt '94, Lecture Notes in Computer Science 950, pp.182-193, SpringerVerlag, 1995.
-
And R.A. Rueppel, "Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem,"
-
-
Nyberg, K.1
-
9
-
-
85027176670
-
-
IEICE Technical Report, ISEC97-11, 1997.
-
S. Araki, S. Uehara, and K. Imamura, "A digital signature scheme for protecting the signer's privacy constructed by using authenticated encryption with message recovery," IEICE Technical Report, ISEC97-11, 1997.
-
S. Uehara, and K. Imamura, "A Digital Signature Scheme for Protecting the Signer's Privacy Constructed by Using Authenticated Encryption with Message Recovery,"
-
-
Araki, S.1
-
10
-
-
85027200422
-
-
1998 Symposium on Cryptography and Information Security, SOIS '98-1.3.C, 1998.
-
S. Araki, S. Uehara, and K. Imamura, "Convertible limited verifier signature based on Horster's authenticated encryption," 1998 Symposium on Cryptography and Information Security, SOIS '98-1.3.C, 1998.
-
S. Uehara, and K. Imamura, "Convertible Limited Verifier Signature Based on Horster's Authenticated Encryption,"
-
-
Araki, S.1
|