-
1
-
-
84978970377
-
Directed acyclic graphs, one-way functions and digital signatures, CRYPTO'94
-
Y. Desmedted, Springer-Verlag, pp
-
D. Bleichenbacher and U.M. mauer, Directed acyclic graphs, one-way functions and digital signatures, CRYPTO'94, Y. Desmedt(ed.), LNCS 839, Springer-Verlag, pp. 75-82,1994.
-
(1994)
LNCS
, vol.839
, pp. 75-82
-
-
Bleichenbacher, D.1
mauer, U.M.2
-
2
-
-
79958074367
-
A Forward-Secure Digital Signature Scheme
-
Michael Weinered, CRYPTO'99 Proceedings, Springer
-
M. Bellare and S. Miner, A Forward-Secure Digital Signature Scheme, Michael Weiner(ed.), CRYPTO'99 Proceedings, LNCS 1666, Springer, 1999, pp. 431-448.
-
(1999)
LNCS
, vol.1666
, pp. 431-448
-
-
Bellare, M.1
Miner, S.2
-
3
-
-
84867248592
-
Untraceable Off-Line Cash in Wallets with Observers
-
Douglas R. Stinsoned, CRYPTO'93 Proceedings, Springer
-
S. Brands, Untraceable Off-Line Cash in Wallets with Observers , Douglas R. Stinson(ed.), CRYPTO'93 Proceedings, LNCS 773, Springer, 1993, pp. 302-318.
-
(1993)
LNCS
, vol.773
, pp. 302-318
-
-
Brands, S.1
-
4
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, In Proceedings of 26th IEEE Symposium on the Foundations of Computer Science(FOCS), pp. 383-395, 1985.
-
(1985)
Proceedings of 26th IEEE Symposium on the Foundations of Computer Science(FOCS)
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
6
-
-
0017018484
-
New Directions in Cryptgraphy
-
November
-
W. Diffe and M.E. Hellman, New Directions in Cryptgraphy, In IEEE Transactions on Information Theory, volume IT-22, no. 6, pp. 644-654, November 1976.
-
(1976)
In IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffe, W.1
Hellman, M.E.2
-
7
-
-
33846642503
-
An Identity-Based Signature Scheme with Bounded Life-Span
-
Y. G. Desmedted, CRYPTO'94 Proceedings, Springer
-
O. Delos and J-J. Quisquater, An Identity-Based Signature Scheme with Bounded Life-Span, Y. G. Desmedt(ed.), CRYPTO'94 Proceedings, LNCS 839, Springer, 1994, pp. 83-94.
-
(1994)
LNCS
, vol.839
, pp. 83-94
-
-
Delos, O.1
Quisquater, J.-J.2
-
8
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Info. Theory, IT31, 1985.
-
(1985)
IEEE Trans. Info. Theory
, vol.IT31
-
-
ElGamal, T.1
-
10
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
S. Goldwasser, S. Micali and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks, SIAM Journal of Computing, Vol. 17, No.2, April 1988, pp.281-308.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
11
-
-
84957707067
-
Self-delegation with Controlled Propagation -or- What If You Lose Your Laptop
-
Hugo Krawczyked, CRYPTO'98 Proceedings, Springer
-
O. Goldreich, B. Pfitzmann, and R. L. Rivest, Self-delegation with Controlled Propagation -or- What If You Lose Your Laptop, Hugo Krawczyk(ed.),CRYPTO'98 Proceedings, LNCS 1462, Springer, 1998, pp. 153-168.
-
(1998)
LNCS
, vol.1462
, pp. 153-168
-
-
Goldreich, O.1
Pfitzmann, B.2
Rivest, R.L.3
-
12
-
-
63449130108
-
Constructing digital signaturs from a one-way function
-
CSL 98, 1979
-
L. Lamport, Constructing digital signaturs from a one-way function, Technical Report SRI Intl. CSL 98, 1979
-
Technical Report SRI Intl
-
-
Lamport, L.1
-
13
-
-
72749106279
-
-
B. Moller, Algorithms for multi-exponentation, In SAC2001, pp. 165-180. Springer-Verlag, 2001. LNCS No. 2259
-
B. Moller, Algorithms for multi-exponentation, In SAC2001, pp. 165-180. Springer-Verlag, 2001. LNCS No. 2259
-
-
-
-
14
-
-
63449123309
-
-
M.Mambo, K. Usuda, and E. Okamoto, Proxy Signatures, Proceedings of the 1995 Symposium on Cryptography and Information Security, Inuyama, Japan, 24-27 Jan 1995 ppB1.1.1-17
-
M.Mambo, K. Usuda, and E. Okamoto, Proxy Signatures, Proceedings of the 1995 Symposium on Cryptography and Information Security, Inuyama, Japan, 24-27 Jan 1995 ppB1.1.1-17
-
-
-
-
15
-
-
84948995055
-
Can D.S.A be Improved? Complexity Trade-Offs with the Digital Signature Standard
-
A. D. Santised, Eurocrypt'94 Proceedings, Springer
-
D. Naccache, D. M'RAIHI, Serge Vaudenay and Dan Raphaeli, Can D.S.A be Improved? Complexity Trade-Offs with the Digital Signature Standard., A. D. Santis(ed.),Eurocrypt'94 Proceedings, LNCS 950, Springer, 1995, pp. 77-85.
-
(1995)
LNCS
, vol.950
, pp. 77-85
-
-
Naccache, D.1
M'RAIHI, D.2
Vaudenay, S.3
Raphaeli, D.4
-
16
-
-
85024576592
-
Universal Electronic Cash
-
J. Feigenbaum ed, CRYPTO'91 Proceedings, Springer
-
T. Okamoto and K. Ohta, Universal Electronic Cash, J. Feigenbaum (ed.), CRYPTO'91 Proceedings, LNCS 576, Springer, 1991, pp. 324-337.
-
(1991)
LNCS
, vol.576
, pp. 324-337
-
-
Okamoto, T.1
Ohta, K.2
-
17
-
-
84876222959
-
Distributed Provers with Applications and their Applications to Undeniable Signatures
-
Donald W. Daviesed, Eurocrypt'91 Proceedings, Springer
-
T.P. Pedersen, Distributed Provers with Applications and their Applications to Undeniable Signatures, Donald W. Davies(ed.),Eurocrypt'91 Proceedings, LNCS 547, Springer, 1991, pp. 221-242.
-
(1991)
LNCS
, vol.547
, pp. 221-242
-
-
Pedersen, T.P.1
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
R.L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystem, communications of the ACM, vol. 21,no. 2, pp. 120-126, 1978.
-
(1978)
communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
20
-
-
84889092523
-
-
National Institute for Standard and Technology, August 30
-
National Institute for Standard and Technology, Digital Signature Standard(DSS) Technical Report 169, August 30 1991.
-
(1991)
Digital Signature Standard(DSS) Technical Report
, vol.169
-
-
|