메뉴 건너뛰기




Volumn 3574, Issue , 2005, Pages 253-266

Hybrid signcryption schemes with insider security

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 26444544161     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11506157_22     Document Type: Conference Paper
Times cited : (69)

References (10)
  • 2
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • L. Knudsen, editor, Advances in Cryptology - Eurocrypt 2002, Springer-Verlag
    • J. H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In L. Knudsen, editor, Advances in Cryptology - Eurocrypt 2002, volume 2332 of Lecture Notes in Computer Science, pages 83-107. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 3
    • 84958982846 scopus 로고    scopus 로고
    • Formal proofs for the security of signcryption
    • D. Naccache and P. Pallier, editors, Public Key Crytpography 2002 (PKC 2002), Springer-Verlag
    • J. Baek, R. Steinfeld, and Y. Zheng. Formal proofs for the security of signcryption. In D. Naccache and P. Pallier, editors, Public Key Crytpography 2002 (PKC 2002), volume 2274 of Lecture Notes in Computer Science, pages 80-98. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2274 , pp. 80-98
    • Baek, J.1    Steinfeld, R.2    Zheng, Y.3
  • 4
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures -how to sign with RSA and Rabin
    • U. Maurer, editor, Advances in Cryptology - Eurocrypt '96, Springer-Verlag
    • M. Bellare and P. Rogaway. The exact security of digital signatures -how to sign with RSA and Rabin. In U. Maurer, editor, Advances in Cryptology - Eurocrypt '96, volume 1070 of Lecture Notes in Computer Science, pages 399-416. Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1070 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1):167-226, 2004.
    • (2004) SIAM Journal on Computing , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 8
    • 12344258539 scopus 로고
    • Efficient signature generation for smart cards
    • C. P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 9
    • 84948976239 scopus 로고    scopus 로고
    • Using hash functions as a hedge against chosen ciphertext attack
    • B. Preneel, editor, Advances in Cryptology - Eurocrypt 2000, Springer-Verlag
    • V. Shoup. Using hash functions as a hedge against chosen ciphertext attack. In B. Preneel, editor, Advances in Cryptology - Eurocrypt 2000, volume 1807 of Lecture Notes in Computer Science, pages 275-288. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 275-288
    • Shoup, V.1
  • 10
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption)
    • B. Kaliski, editor, Advances in Cryptology - Crypto '97, Springer-Verlag
    • Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption). In B. Kaliski, editor, Advances in Cryptology - Crypto '97, volume 1294 of Lecture Notes in Computer Science, pages 165-179. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 165-179
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.