-
1
-
-
84950897985
-
Security of number theoretic public key cryptosystems against random attack
-
three parts: 1978
-
B. Blakley and G. R. Blakley, "Security of number theoretic public key cryptosystems against random attack," Cryptologia, 1978, in three parts: Part 1: Vol. 2, No. 4, 1978, pp.305-321; Part 2: Vol. 3, No. 1, 1979, pp. 29-42; Part 3: Vol. 3, No. 2, 1979, pp. 105-118.
-
(1978)
Cryptologia
, vol.2
, Issue.4 PART 1
, pp. 305-321
-
-
Blakley, B.1
Blakley, G.R.2
-
2
-
-
84950897985
-
-
B. Blakley and G. R. Blakley, "Security of number theoretic public key cryptosystems against random attack," Cryptologia, 1978, in three parts: Part 1: Vol. 2, No. 4, 1978, pp.305-321; Part 2: Vol. 3, No. 1, 1979, pp. 29-42; Part 3: Vol. 3, No. 2, 1979, pp. 105-118.
-
(1979)
Cryptologia
, vol.3
, Issue.1 PART 2
, pp. 29-42
-
-
-
3
-
-
84950923057
-
-
B. Blakley and G. R. Blakley, "Security of number theoretic public key cryptosystems against random attack," Cryptologia, 1978, in three parts: Part 1: Vol. 2, No. 4, 1978, pp.305-321; Part 2: Vol. 3, No. 1, 1979, pp. 29-42; Part 3: Vol. 3, No. 2, 1979, pp. 105-118.
-
(1979)
Cryptologia
, vol.3
, Issue.2 PART 3
, pp. 105-118
-
-
-
4
-
-
0018711581
-
RSA public key cryptosystems do not always conceal messages
-
G. R. Blakley and I. Borosh, "RSA public key cryptosystems do not always conceal messages," Computers & Mathematics with Applications, Vol. 5, No. 3, 1979, pp. 169-178.
-
(1979)
Computers & Mathematics with Applications
, vol.5
, Issue.3
, pp. 169-178
-
-
Blakley, G.R.1
Borosh, I.2
-
6
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
IT-31
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information, IT-31, 1985, pp. 469-472.
-
(1985)
IEEE Transactions on Information
, pp. 469-472
-
-
ElGamal, T.1
-
7
-
-
84990731886
-
How to prove yourself: Practical solution to identification and signature problems
-
A. Fiat and A. Shamir, "How to prove yourself: Practical solution to identification and signature problems," in Proceedings of Advances in Cryptology - Crypto '86, 1987, pp. 186-199.
-
(1987)
Proceedings of Advances in Cryptology - Crypto '86
, pp. 186-199
-
-
Fiat, A.1
Shamir, A.2
-
9
-
-
0028508211
-
Group-oriented (t, n) threshold digital signature scheme and digital multisignature
-
L. Harn, "Group-oriented (t, n) threshold digital signature scheme and digital multisignature," IEE Proceedings on Computer Digital Technology, Vol. 141, No. 5, 1994, pp. 307-313.
-
(1994)
IEE Proceedings on Computer Digital Technology
, vol.141
, Issue.5
, pp. 307-313
-
-
Harn, L.1
-
11
-
-
84948965443
-
Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders
-
C. Li, T. Hwang, and N. Lee, "Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders," in Proceedings of Advances in Cryptology - EuroCrypto '94, 1994, pp. 194-204.
-
(1994)
Proceedings of Advances in Cryptology - Eurocrypto '94
, pp. 194-204
-
-
Li, C.1
Hwang, T.2
Lee, N.3
-
14
-
-
0024104968
-
A digital multisignature scheme using bijective public-key cryptosystems
-
T. Okamoto, "A digital multisignature scheme using bijective public-key cryptosystems," ACM Tranactions on Computer Systems, Vol. 6, No. 8, 1988, pp. 432-441.
-
(1988)
ACM Tranactions on Computer Systems
, vol.6
, Issue.8
, pp. 432-441
-
-
Okamoto, T.1
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystem," Communications of ACM, Vol. 21, No. 2, 1978, pp. 120-126.
-
(1978)
Communications of ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
16
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communications of ACM, Vol. 22, 1979, pp. 612-613.
-
(1979)
Communications of ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
85028891099
-
Structural properties of one - Way hash functions
-
Y. Zheng, T. Matsumoto, and H. Imai, "Structural properties of one - way hash functions," in Proceedings of Advances in Cryptology - Crypto '90, 1990, pp. 285-302.
-
(1990)
Proceedings of Advances in Cryptology - Crypto '90
, pp. 285-302
-
-
Zheng, Y.1
Matsumoto, T.2
Imai, H.3
-
18
-
-
0024141971
-
How to share a secret with cheaters
-
M. Tompa and H. Woll, "How to share a secret with cheaters," Jounal of Cryptol, Vol. 1, No. 2, 1988, pp.133-138.
-
(1988)
Jounal of Cryptol
, vol.1
, Issue.2
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
-
20
-
-
0029638543
-
Fair construction of a secret
-
H. Lin and L. Harn, "Fair construction of a secret," Information Processing Letters, Vol. 55, No. 1, 1994, pp. 45-47.
-
(1994)
Information Processing Letters
, vol.55
, Issue.1
, pp. 45-47
-
-
Lin, H.1
Harn, L.2
-
21
-
-
0029369348
-
Cheating detection and cheater identification in secret sharing schemes
-
T. C. Wu and T. S. Wu, "Cheating detection and cheater identification in secret sharing schemes," IEE Proceedings of Computer Digital Technology, Vol. 142, No. 5, 1995, pp. 367-369.
-
(1995)
IEE Proceedings of Computer Digital Technology
, vol.142
, Issue.5
, pp. 367-369
-
-
Wu, T.C.1
Wu, T.S.2
|