-
1
-
-
84956857891
-
A signature scheme with message recovery as secure as discrete logarithm
-
[1] M. Abe and T. Okamoto, “A signature scheme with message recovery as secure as discrete logarithm", Asiacrypt'99, LNCS 1716 (1999) 378-389.
-
(1999)
Asiacrypt'99, LNCS
, vol.1716
, pp. 378-389
-
-
Abe, M.1
Okamoto, T.2
-
2
-
-
84957613967
-
Security amplification by composition: The case of doubly-iterated, ideal ciphers
-
[2] W. Aiello, et al., “Security amplification by composition: the case of doubly-iterated, ideal ciphers", Crypto'98, LNCS 1462 (1998) 390-407.
-
(1998)
Crypto'98, LNCS
, vol.1462
, pp. 390-407
-
-
Aiello, W.1
-
3
-
-
0031351741
-
A concrete security treatment of symmetric encryption: Ana-lysis of the DES modes of operation
-
[3] M. Bellare, et al., “A concrete security treatment of symmetric encryption: Ana-lysis of the DES modes of operation", Proc. 38th FOCS, 1997, 394-403.
-
(1997)
Proc. 38Th FOCS
, pp. 394-403
-
-
Bellare, M.1
-
5
-
-
84947906522
-
The exact security of digital signatures-how to sign with RSA and Rabin
-
[5] M. Bellare and P. Rogaway, “The exact security of digital signatures-how to sign with RSA and Rabin", Eurocrypt'96, LNCS 1070 (1996) 399-416.
-
(1996)
Eurocrypt'96, LNCS
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84958663551
-
Collision-resistant hashing: Towards making UO-WHFs practical
-
[6] M. Bellare and P. Rogaway, “Collision-resistant hashing: towards making UO-WHFs practical", Crypto'97, LNCS 1294 (1997) 470-484.
-
(1997)
Crypto'97, LNCS
, vol.1294
, pp. 470-484
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
0031619016
-
The random oracle methodology, revisi-ted (Preliminary version)
-
[7] R. Canetti, O. Goldreich and S. Halevi, “The random oracle methodology, revisi-ted (preliminary version)", Proc. 30th STOC, 1998, 209-218.
-
(1998)
Proc. 30Th STOC
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
8
-
-
85016871743
-
-
Postage Indicia Standard" for Canada Post, Draft Version 1. 2
-
[8] “Postage Indicia Standard" for Canada Post, Draft Version 1. 2, 1999.
-
(1999)
-
-
-
9
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
[9] R. Cramer and V. Shoup, “A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack", Crypto'98, LNCS 1462 (1998) 13-25.
-
(1998)
Crypto'98, LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
10
-
-
85016880672
-
-
presented at the Conference on The Mathematics of Public-Key Cryptography, The Fields Institute, Toronto, Canada
-
[10] M. Jakobsson and C. P. Schnorr, “Security of discrete log cryptosystems in the random oracle + generic model", presented at the Conference on The Mathematics of Public-Key Cryptography, The Fields Institute, Toronto, Canada, (1999).
-
(1999)
Security of Discrete Log Cryptosystems in the Random Oracle + Generic Model
-
-
Jakobsson, M.1
Schnorr, C.P.2
-
12
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
[12] M. Naor and M. Yung, “Universal one-way hash functions and their cryptographic applications", Proc. 21st STOC, ACM (1989), 33-43.
-
(1989)
Proc. 21St STOC, ACM
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
13
-
-
0002670834
-
Message recovery for signature schemes based on the discrete logarithm problem
-
[13] K. Nyberg and R. Rueppel, “Message recovery for signature schemes based on the discrete logarithm problem", Designs, Codes and Cryptography, 7 (1996), 61-81.
-
(1996)
Designs, Codes and Cryptography
, vol.7
, pp. 61-81
-
-
Nyberg, K.1
Rueppel, R.2
-
15
-
-
84927727752
-
Security proofs for signature schemes
-
[15] D. Pointcheval and J. Stern, “Security proofs for signature schemes", Eu-rocrypt'96, LNCS 1070 (1996) 387-398.
-
(1996)
Eu-Rocrypt'96, LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
16
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
[16] V. Shoup, “Lower bounds for discrete logarithms and related problems", Eu-rocrypt'97, LNCS 1233 (1997) 256-266.
-
(1997)
Eu-Rocrypt'97, LNCS
, vol.1233
, pp. 256-266
-
-
Shoup, V.1
-
17
-
-
85016885251
-
-
USPS Information Based Indicia Program (IBIP): Performance Criteria for Infor-mation Based Indicia and Security Architecture for IBI Postage Metering Systems (PCIBISAIPMS), draft
-
[17] USPS Information Based Indicia Program (IBIP): Performance Criteria for Infor-mation Based Indicia and Security Architecture for IBI Postage Metering Systems (PCIBISAIPMS), draft, 1998.
-
(1998)
-
-
|