-
2
-
-
84947906522
-
The exact security of digital signatures: How to sign with rsa and rabin
-
Bellare M., Rogaway P. The exact security of digital signatures: how to sign with rsa and rabin. Advances in Cryptology Eurocrypt '96. 1996;399-416.
-
(1996)
Advances in Cryptology Eurocrypt '96
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
0032712929
-
Pki, elliptic curve cryptography, and digital signatures
-
Caelli W.J., Dawson E.P., Rea S.A. Pki, elliptic curve cryptography, and digital signatures. Computers & Security. 18(1):1999;47-66.
-
(1999)
Computers & Security
, vol.18
, Issue.1
, pp. 47-66
-
-
Caelli, W.J.1
Dawson, E.P.2
Rea, S.A.3
-
4
-
-
0030192262
-
Parallel computation of the generating keys for RSA cryptosystems
-
Chang C.-C., Hwang M.-S. Parallel computation of the generating keys for RSA cryptosystems. IEE Electronics Letters. 32(15):1996;1365-1366.
-
(1996)
IEE Electronics Letters
, vol.32
, Issue.15
, pp. 1365-1366
-
-
Chang, C.-C.1
Hwang, M.-S.2
-
5
-
-
0033888714
-
ElGamal-like digital signature and multisignature schemes using self-certified public keys
-
Feb.
-
Chang Y.-S., Wu T.-C., Huang S.-C. ElGamal-like digital signature and multisignature schemes using self-certified public keys. The Journal of Systems and Software. 50:2000 (Feb.);99-105.
-
(2000)
The Journal of Systems and Software
, vol.50
, pp. 99-105
-
-
Chang, Y.-S.1
Wu, T.-C.2
Huang, S.-C.3
-
7
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory. IT-31:1985 (July);469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, pp. 469-472
-
-
Elgamal, T.1
-
9
-
-
84934275826
-
Authenticated encryption schemes with low communication costs
-
Horster P., Michels M., Petersen H. Authenticated encryption schemes with low communication costs. Electronics Letters. 30(15):1994;1212.
-
(1994)
Electronics Letters
, vol.30
, Issue.15
, pp. 1212
-
-
Horster, P.1
Michels, M.2
Petersen, H.3
-
11
-
-
0141836511
-
Traceability on RSA-based partially signature with low computation
-
Accepted for publication
-
Hwang M.-S., Lee C.-C., Lai Y.-C. Traceability on RSA-based partially signature with low computation. Applied Mathematics and Computation. 2002;. Accepted for publication.
-
(2002)
Applied Mathematics and Computation
-
-
Hwang, M.-S.1
Lee, C.-C.2
Lai, Y.-C.3
-
13
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz K. Elliptic curve cryptosystems. Mathematics of Computation. 48(177):1987;203-209.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, K.1
-
14
-
-
0031222768
-
Authenticated encryption schemes with linkage between message blocks
-
Lee W.-B., Chang C.-C. Authenticated encryption schemes with linkage between message blocks. Information Processing Letters. 63(5):1997;247-250.
-
(1997)
Information Processing Letters
, vol.63
, Issue.5
, pp. 247-250
-
-
Lee, W.-B.1
Chang, C.-C.2
-
16
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Advances in Cryptology, CRYPTO '85
-
Miller V.S. Use of elliptic curves in cryptography. Advances in Cryptology, CRYPTO '85. Lecture Notes in Computer Science. vol. 218:1985;417-426.
-
(1985)
Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
17
-
-
84955571277
-
A message recovery signature scheme equivalent to DSA over elliptic curves
-
Miyaji A. A message recovery signature scheme equivalent to DSA over elliptic curves. Advances in Cryptology, ASIACRYPT '96. 1996;1-14.
-
(1996)
Advances in Cryptology, ASIACRYPT '96
, pp. 1-14
-
-
Miyaji, A.1
-
18
-
-
0003629991
-
Secure hash standard
-
NITS, US Department Commerce, April
-
NITS, Secure hash standard. Tech. Rep. FIPS 180-1, NITS, US Department Commerce, 1995 April.
-
(1995)
Tech. Rep. FIPS
, vol.180-181
-
-
-
20
-
-
0001312077
-
Message recovery for signature schemes based on the discrete logarithm
-
Nyberg K., Rueppel R.A. Message recovery for signature schemes based on the discrete logarithm. Advances in Cryptology, EUROCRYPT '94. 1994;175-190.
-
(1994)
Advances in Cryptology, EUROCRYPT '94
, pp. 175-190
-
-
Nyberg, K.1
Rueppel, R.A.2
-
21
-
-
0002670834
-
Message recovery for signature schemes based on the discrete logarithm
-
Nyberg K., Rueppel R.A. Message recovery for signature schemes based on the discrete logarithm. Designs, Codes and Cryptography. 7(1-2):1996;61-81.
-
(1996)
Designs, Codes and Cryptography
, vol.7
, Issue.1-2
, pp. 61-81
-
-
Nyberg, K.1
Rueppel, R.A.2
-
22
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Feb.
-
Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM. 21:1978 (Feb.);120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
23
-
-
0035520955
-
Cryptographic system using a self-certified public key based on discrete logarithms
-
Shao Z. Cryptographic system using a self-certified public key based on discrete logarithms. IEE Proceedings - Computer Digital Technology. 148(6):2001;233-237.
-
(2001)
IEE Proceedings - Computer Digital Technology
, vol.148
, Issue.6
, pp. 233-237
-
-
Shao, Z.1
-
24
-
-
0036335479
-
Authenticated encryption schemes with message linkages for message flows
-
Tseng Y.-M., Jan J.-K., Chien H.-Y. Authenticated encryption schemes with message linkages for message flows. Computers and Electrical Engineering. 29(1):2003;101-109.
-
(2003)
Computers and Electrical Engineering
, vol.29
, Issue.1
, pp. 101-109
-
-
Tseng, Y.-M.1
Jan, J.-K.2
Chien, H.-Y.3
-
25
-
-
0037443344
-
Digital signature with message recovery using self-certified public keys and its variants
-
Tseng Y.-M., Jan J.-K., Chien H.-Y. Digital signature with message recovery using self-certified public keys and its variants. Applied Mathematics and Computation. 136(2-3):2003;203-214.
-
(2003)
Applied Mathematics and Computation
, vol.136
, Issue.2-3
, pp. 203-214
-
-
Tseng, Y.-M.1
Jan, J.-K.2
Chien, H.-Y.3
|