-
1
-
-
0011255177
-
Internet X.509 public key infrastructure, certificate and Certificate Revocation List (CRL) Profile
-
April
-
Internet X.509 Public Key Infrastructure, Certificate and Certificate Revocation List (CRL) Profile, R. Housley, W. Polk, W. Ford and D. Solo, RFC 3280, April 2002.
-
(2002)
RFC
, vol.3280
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
2
-
-
26444510202
-
On the soundness of certificate validation in X.509 and PKIX
-
to appear in
-
On the Soundness of Certificate Validation in X.509 and PKIX, T. Pornin and J. P. Stern, to appear in EuroPKI 2005.
-
EuroPKI 2005
-
-
Pornin, T.1
Stern, J.P.2
-
3
-
-
2442476755
-
Public-key Cryptography Standards (PKCS) #1: RSA cryptography specifications version 2.1
-
February
-
Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1, J. Jonsson and B. Kaliski, RFC 3447, February 2003.
-
(2003)
RFC
, vol.3447
-
-
Jonsson, J.1
Kaliski, B.2
-
4
-
-
0003508562
-
Digital signature standard
-
National Institute of Standards and Technology (NIST)
-
Digital Signature Standard, National Institute of Standards and Technology (NIST), FIPS 186-2, 2000.
-
(2000)
FIPS
, vol.186
, Issue.2
-
-
-
5
-
-
0029323414
-
Key-spoofing attacks on nested signature blocks
-
Key-spoofing attacks on nested signature blocks, R. Christianson and M. R. Low, Electronics Letters, vol. 31, no. 13, 1995, pp. 1043-1044.
-
(1995)
Electronics Letters
, vol.31
, Issue.13
, pp. 1043-1044
-
-
Christianson, R.1
Low, M.R.2
-
6
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, S. Goldwasser, S. Micali and R. Rivest, SIAM Journal on Computing, vol. 17, no. 2, 1988, pp. 281-308.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
7
-
-
84937411969
-
Flaws in applying proof methodologies to signature schemes
-
Lecture Notes in Computer Science
-
Flaws in Applying Proof Methodologies to Signature Schemes, J. Stern, D. Pointcheval, J. Lee and N. Smart, Lecture Notes in Computer Science, Proceedings of Crypto'02, 2002, pp. 93-110.
-
(2002)
Proceedings of Crypto'02
, pp. 93-110
-
-
Stern, J.1
Pointcheval, D.2
Lee, J.3
Smart, N.4
-
8
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
February
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, R. Rivest, A. Shamir and L. Adleman, Communications of the ACM, February 1978, pp. 120-126.
-
(1978)
Communications of the ACM
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
9
-
-
0020194569
-
Fast decipherment algorithm for RSA public-key cryptosystem
-
October
-
Fast decipherment algorithm for RSA public-key cryptosystem, J.-J. Quisquater and C. Couvreur, Electronics Letters, vol. 18, no. 21, October 1982, pp. 905-907.
-
(1982)
Electronics Letters
, vol.18
, Issue.21
, pp. 905-907
-
-
Quisquater, J.-J.1
Couvreur, C.2
-
10
-
-
12344258539
-
Efficient signature generation by smart cards
-
Efficient signature generation by smart cards, G.P. Schnorr, Journal of Cryptology, vol. 4, 1991, pp. 161-174.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, G.P.1
-
11
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Lecture Notes in Computer Science
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, T. El-Gamal, Lecture Notes in Computer Science, Proceedings of Crypto'84, 1985, pp. 10-18.
-
(1985)
Proceedings of Crypto'84
, pp. 10-18
-
-
El-Gamal, T.1
-
12
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM Press
-
Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols, M. Bellare and P. Rogaway, Proceedings of the 1st CCS, ACM Press, 1993, pp. 62-73.
-
(1993)
Proceedings of the 1st CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
13
-
-
84990731886
-
How to prove yourself: Practical solutions of identification and signature problems
-
Lecture Notes in Computer Science
-
How to Prove Yourself: Practical Solutions of Identification and Signature Problems, A. Fiat and A. Shamir, Lecture Notes in Computer Science, Proceedings of Crypto'86, 1987, pp. 186-194.
-
(1987)
Proceedings of Crypto'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
|