-
4
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory. 31(4):1985;469-472.
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
6
-
-
0031654421
-
Efficient group signature scheme based on the discrete logarithm
-
Lee W.B., Chang C.C. Efficient group signature scheme based on the discrete logarithm. IEE Proc. Comput. Digit. Tech. 145(1):1998;15-18.
-
(1998)
IEE Proc. Comput. Digit. Tech.
, vol.145
, Issue.1
, pp. 15-18
-
-
Lee, W.B.1
Chang, C.C.2
-
7
-
-
0002983736
-
Modified Maurer-Yacobi's scheme and its application
-
C.H. Lim, P.J. Lee, Modified Maurer-Yacobi's scheme and its application, in: Proc. AUSCRYPT'92, 1992, pp. 308-323.
-
(1992)
In: Proc. AUSCRYPT'92
, pp. 308-323
-
-
Lim, C.H.1
Lee, P.J.2
-
10
-
-
0029325653
-
Fast generation of prime numbers and secure public-key distribution system
-
Maurer U.M. Fast generation of prime numbers and secure public-key distribution system. J. Cryptol. 8(3):1995;123-155.
-
(1995)
J. Cryptol.
, vol.8
, Issue.3
, pp. 123-155
-
-
Maurer, U.M.1
-
11
-
-
0025545583
-
A fast software one-way hash function
-
Merkle R.C. A fast software one-way hash function. J. Cryptol. 1:1990;43-58.
-
(1990)
J. Cryptol.
, vol.1
, pp. 43-58
-
-
Merkle, R.C.1
-
12
-
-
0024053244
-
Practical extension of Fiat-Shamir scheme
-
Ohta K., Okamoto E. Practical extension of Fiat-Shamir scheme. Electr. Lett. 24(15):1988;955-956.
-
(1988)
Electr. Lett.
, vol.24
, Issue.15
, pp. 955-956
-
-
Ohta, K.1
Okamoto, E.2
-
13
-
-
0031236389
-
ID-based group signature
-
Park S., Kim S., Won D. ID-based group signature. Electr. Lett. 33(19):1997;1616-1617.
-
(1997)
Electr. Lett.
, vol.33
, Issue.19
, pp. 1616-1617
-
-
Park, S.1
Kim, S.2
Won, D.3
-
14
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
Pohlig S.C., Hellman M.E. An improved algorithm for computing logarithms over. GF(p) and its cryptographic significance IEEE Trans. Inform. Theory. 24:1978;106-110.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
15
-
-
84976113380
-
Theorems on factorization and primality testing
-
Pollard J.M. Theorems on factorization and primality testing. Proc. Cambridge Philos. Soc. 76:1974;521-528.
-
(1974)
Proc. Cambridge Philos. Soc.
, vol.76
, pp. 521-528
-
-
Pollard, J.M.1
-
16
-
-
0017930809
-
A method for obtaining digital signature and public key cryptosystem
-
Rivest R.L., Shamir A., Adelman L. A method for obtaining digital signature and public key cryptosystem. Comm ACM. 21(2):1978;120-126.
-
(1978)
Comm ACM.
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adelman, L.3
-
17
-
-
0001827537
-
Identity-based cryptosystem based on the discrete logarithm problem
-
A. Shamir, Identity-based cryptosystem based on the discrete logarithm problem, in: Proc. CRYPTO'84, 1985, pp. 47-53.
-
(1985)
In: Proc. CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
18
-
-
84947917119
-
Publicly verifiable secret sharing
-
M. Stadler, Publicly verifiable secret sharing, in: Proc. EUROCRYPT'96, 1997, pp. 190-199.
-
(1997)
In: Proc. EUROCRYPT'96
, pp. 190-199
-
-
Stadler, M.1
|