-
2
-
-
84947237328
-
On the security of joint signature and encryption
-
L. Knudsen, editor, Advances in Cryptology - Eurocrypt 2002, Springer-Verlag
-
J. H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In L. Knudsen, editor, Advances in Cryptology - Eurocrypt 2002, volume 2332 of Lecture Notes in Computer Science, pages 83-107. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
3
-
-
84958982846
-
Formal proofs for the security of signcryption
-
D. Naccache and P. Pallier, editors, Public Key Crytpography 2002 (PKC 2002), Springer-Verlag
-
J. Baek, R. Steinfeld, and Y. Zheng. Formal proofs for the security of signcryption. In D. Naccache and P. Pallier, editors, Public Key Crytpography 2002 (PKC 2002), volume 2274 of Lecture Notes in Computer Science, pages 80-98. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2274
, pp. 80-98
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
4
-
-
84947906522
-
The exact security of digital signatures -how to sign with RSA and Rabin
-
U. Maurer, editor, Advances in Cryptology - Eurocrypt '96, Springer-Verlag
-
M. Bellare and P. Rogaway. The exact security of digital signatures -how to sign with RSA and Rabin. In U. Maurer, editor, Advances in Cryptology - Eurocrypt '96, volume 1070 of Lecture Notes in Computer Science, pages 399-416. Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1):167-226, 2004.
-
(2004)
SIAM Journal on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
8
-
-
12344258539
-
Efficient signature generation for smart cards
-
C. P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
9
-
-
84948976239
-
Using hash functions as a hedge against chosen ciphertext attack
-
B. Preneel, editor, Advances in Cryptology - Eurocrypt 2000, Springer-Verlag
-
V. Shoup. Using hash functions as a hedge against chosen ciphertext attack. In B. Preneel, editor, Advances in Cryptology - Eurocrypt 2000, volume 1807 of Lecture Notes in Computer Science, pages 275-288. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 275-288
-
-
Shoup, V.1
-
10
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption)
-
B. Kaliski, editor, Advances in Cryptology - Crypto '97, Springer-Verlag
-
Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption). In B. Kaliski, editor, Advances in Cryptology - Crypto '97, volume 1294 of Lecture Notes in Computer Science, pages 165-179. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
|