-
1
-
-
0032682993
-
The limited verifier signature and its application
-
Araki, S., S. Uehara and K. Imamura (1999). The limited verifier signature and its application. IEICE Trans. On Fundamentals, E82A(1), 63-68.
-
(1999)
IEICE Trans. On Fundamentals
, vol.E82A
, Issue.1
, pp. 63-68
-
-
Araki, S.1
Uehara, S.2
Imamura, K.3
-
2
-
-
0742283360
-
Improved authenticated multiple-key agreement protocol without using conventional one-way function
-
Chien, H.Y., and J.K. Jan (2003). Improved authenticated multiple-key agreement protocol without using conventional one-way function. Accepted in Applied Mathematics and Computation.
-
(2003)
Accepted in Applied Mathematics and Computation
-
-
Chien, H.Y.1
Jan, J.K.2
-
3
-
-
0036879984
-
Forgery attacks on multi-signature schemes for authenticating mobile code delegates
-
Chien, H.Y., J.K. Jan and Y.M. Tseng (2002). Forgery attacks on multi-signature schemes for authenticating mobile code delegates. IEEE Transactions on Vehicular Technology, 51(6), 1669-1671.
-
(2002)
IEEE Transactions on Vehicular Technology
, vol.51
, Issue.6
, pp. 1669-1671
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
5
-
-
0029223753
-
Two algorithms for modular exponentiation using nonstandard arithmetic
-
Dimitrov, V., and T. Cooklev (1995). Two algorithms for modular exponentiation using nonstandard arithmetic. IEICE Trans. Fundamentals, E78-A(1), 82-87.
-
(1995)
IEICE Trans. Fundamentals
, vol.E78-A
, Issue.1
, pp. 82-87
-
-
Dimitrov, V.1
Cooklev, T.2
-
6
-
-
0001849866
-
The status of MD5 after a recent attack
-
Dobbertin, H. (1996). The status of MD5 after a recent attack. CryptoBytes, 2(2), 1-6.
-
(1996)
CryptoBytes
, vol.2
, Issue.2
, pp. 1-6
-
-
Dobbertin, H.1
-
7
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Elgamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. On Information Theory, IT-31(4), 469-472.
-
(1985)
IEEE Trans. On Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
8
-
-
0003018867
-
An authenticated key agreement protocol without using one-way function
-
Kaohsiung, Taiwan, May 1998
-
Harn, L., and H.Y. Lin (1998). An authenticated key agreement protocol without using one-way function. In Proc. 8th National Conf. Information Security, Kaohsiung, Taiwan, May 1998. pp. 155-160.
-
(1998)
Proc. 8th National Conf. Information Security
, pp. 155-160
-
-
Harn, L.1
Lin, H.Y.2
-
9
-
-
0032655531
-
Cryptanalysis and improvement of Petersen-Michel's signcryption scheme
-
He, W.H., and T.C. Wu (1999). Cryptanalysis and improvement of Petersen-Michel's signcryption scheme. In IEE proceedings - Computers and Digital Techniques, 146(2). pp. 123-124.
-
(1999)
IEE Proceedings - Computers and Digital Techniques
, vol.146
, Issue.2
, pp. 123-124
-
-
He, W.H.1
Wu, T.C.2
-
10
-
-
84934275826
-
Authenticated encryption schemes with low communication costs
-
Horster, P., M. Michel and H. Petersen (1994). Authenticated encryption schemes with low communication costs. Electronics Letters, 30(15), 1212-1213.
-
(1994)
Electronics Letters
, vol.30
, Issue.15
, pp. 1212-1213
-
-
Horster, P.1
Michel, M.2
Petersen, H.3
-
11
-
-
0029375592
-
Authenticated encryption scheme without using a one-way function
-
Lee, W.B., and C.C. Chang (1995). Authenticated encryption scheme without using a one-way function. Electronics Letters, 31(19), 1656-1657.
-
(1995)
Electronics Letters
, vol.31
, Issue.19
, pp. 1656-1657
-
-
Lee, W.B.1
Chang, C.C.2
-
13
-
-
84936033986
-
The digital signature standard by NIST
-
NIST (1992). The digital signature standard by NIST. Comm. ACM, 35(7), 36-40.
-
(1992)
Comm. ACM
, vol.35
, Issue.7
, pp. 36-40
-
-
-
14
-
-
0003629990
-
-
Nist Fip Pub 180. National Institute of Standards and Technology, US department of Commerce, DRAFT 1993
-
NIST FIP PUB 180 (1993). Secure hash standard, National Institute of Standards and Technology, US department of Commerce, DRAFT 1993.
-
(1993)
Secure Hash Standard
-
-
-
16
-
-
0017930809
-
A method for obtaining digital signature and public-key cryptosystem
-
Rivest, R.L., A. Shamir and L. Adleman (1978). A method for obtaining digital signature and public-key cryptosystem. Communications of the ACM, 21(2), 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
17
-
-
0003602325
-
The MD5 message-digest algorithm
-
Internet Activities Board, Internet Privacy Task Force
-
Rivest, R.L. (1993). The MD5 message-digest algorithm. RFC 1231, Internet Activities Board, Internet Privacy Task Force.
-
(1993)
RFC 1231
-
-
Rivest, R.L.1
-
18
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer, New York
-
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in Cryptography - CRYPTO'84. Springer, New York. pp. 47-53.
-
(1984)
Advances in Cryptography - CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
20
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) « cost (signature) + cost (encryption)
-
Springer, New York
-
Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) « cost (signature) + cost (encryption). In Advances in Cryptology - CRYPTO'97. Springer, New York. pp. 165-179.
-
(1997)
Advances in Cryptology - CRYPTO'97
, pp. 165-179
-
-
Zheng, Y.1
|