-
1
-
-
0010364857
-
Discrete logarithms and factoring
-
University of California, Computer Science Division (EECS)
-
E. Bach, "Discrete logarithms and factoring," Technical Report UCB/CSD 84/186, University of California, Computer Science Division (EECS), 1984.
-
(1984)
Technical Report
, vol.UCB-CSD 84-186
-
-
Bach, E.1
-
2
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol.IT-22, no.6, pp.644-654, 1974.
-
(1974)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
3
-
-
84937570422
-
Self-certified public keys
-
Advances in Cryptology-eurocrypt'91 Springer-Verlag, Berlin
-
M. Girault, "Self-certified public keys," Advances in Cryptology-Eurocrypt'91, LNCS 547, pp.490-497, Springer-Verlag, Berlin, 1991.
-
(1991)
LNCS
, vol.547
, pp. 490-497
-
-
Girault, M.1
-
4
-
-
0026172323
-
Average case completeness
-
Y. Gurevich, "Average case completeness," J. Comput. Syst. Sci., vol.42, pp.346-398, 1991.
-
(1991)
J. Comput. Syst. Sci.
, vol.42
, pp. 346-398
-
-
Gurevich, Y.1
-
5
-
-
0035120027
-
On the security of the Okamoto-Tanaka ID-based key exchange scheme against active attacks
-
Jan.
-
S.J. Kim, M. Mambo, T. Okamoto, H. Shizuya, M. Tada, and D.H. Won, "On the security of the Okamoto-Tanaka ID-based key exchange scheme against active attacks," IEICE Trans. Fundamentals, vol.E84-A, no.l, pp.231-238, Jan. 2001.
-
(2001)
IEICE Trans. Fundamentals
, vol.E84-A
, Issue.1
, pp. 231-238
-
-
Kim, S.J.1
Mambo, M.2
Okamoto, T.3
Shizuya, H.4
Tada, M.5
Won, D.H.6
-
6
-
-
0032661954
-
A note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme
-
Jan.
-
M. Mambo and H. Shizuya, "A note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme," IEICE Trans. Fundamentals, vol.E82-A, no.l, pp.77-80, Jan. 1999.
-
(1999)
IEICE Trans. Fundamentals
, vol.E82-A
, Issue.1
, pp. 77-80
-
-
Mambo, M.1
Shizuya, H.2
-
7
-
-
0024139776
-
A key distribution system equivalent to factoring
-
K.S. McCurley, "A key distribution system equivalent to factoring," J. Cryptology, vol.1, pp.95-105, 1988.
-
(1988)
J. Cryptology
, vol.1
, pp. 95-105
-
-
McCurley, K.S.1
-
9
-
-
0024665726
-
Key distribution system based on identification information
-
E. Okamoto and K. Tanaka, "Key distribution system based on identification information," IEEE J. Sel. Areas Commun., vol.7, pp.481-485, 1989.
-
(1989)
IEEE J. Sel. Areas Commun.
, vol.7
, pp. 481-485
-
-
Okamoto, E.1
Tanaka, K.2
-
11
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, vol.21, no.2, pp.120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
12
-
-
0028466586
-
Modern key agreement techniques
-
July
-
R.A. Rueppel and P.C. van Oorschot, "Modern key agreement techniques," Computer Communications, vol.17 no.7, pp.458-465, July 1994.
-
(1994)
Computer Communications
, vol.17
, Issue.7
, pp. 458-465
-
-
Rueppel, R.A.1
Van Oorschot, P.C.2
-
13
-
-
84957353267
-
Relationships among the computational powers of breaking discrete log cryptosystems
-
Springer-Verlag
-
K. Sakurai and H. Shizuya, "Relationships among the computational powers of breaking discrete log cryptosystems," Advances in Cryptology-Eurocrypt'95 LNCS 921, pp.341-355, Springer-Verlag, 1995. J. Cryptology, vol.11, pp.29-43, 1998.
-
(1995)
Advances in Cryptology-Eurocrypt'95 LNCS
, vol.921
, pp. 341-355
-
-
Sakurai, K.1
Shizuya, H.2
-
14
-
-
0003610767
-
-
K. Sakurai and H. Shizuya, "Relationships among the computational powers of breaking discrete log cryptosystems," Advances in Cryptology-Eurocrypt'95 LNCS 921, pp.341-355, Springer-Verlag, 1995. J. Cryptology, vol.11, pp.29-43, 1998.
-
(1998)
J. Cryptology
, vol.11
, pp. 29-43
-
-
-
15
-
-
0009435059
-
Composite Diffie-Hellman public-key generating systems are hard to break
-
Computer Science Department, Technion-Israel Institute of Technology
-
Z. Shmuely, "Composite Diffie-Hellman public-key generating systems are hard to break," Technical Report, no.356, Computer Science Department, Technion-Israel Institute of Technology, 1985.
-
(1985)
Technical Report
, vol.356
-
-
Shmuely, Z.1
-
16
-
-
0141911098
-
Reduction among number theoretic problems
-
H. Woll, "Reduction among number theoretic problems," Inf. Comput., vol.72, pp.167-179, 1987.
-
(1987)
Inf. Comput.
, vol.72
, pp. 167-179
-
-
Woll, H.1
|