-
1
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Advances in cryptology - Crypto'02, Springer-Verlag
-
Barreto P.S.L.M., Kim H.Y., Lynn B., and Scott M. Efficient algorithms for pairing-based cryptosystems. Advances in cryptology - Crypto'02. LNCS vol. 2442 (2002), Springer-Verlag 354-368
-
(2002)
LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
2
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in cryptology - Crypto'01, Springer-Verlag
-
Boneh D., and Franklin M. Identity-based encryption from the Weil pairing. Advances in cryptology - Crypto'01. LNCS vol. 2139 (2001), Springer-Verlag 213-229
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
0026153410
-
Remote password authentication with smart cards
-
Chang C.C., and Wu T.C. Remote password authentication with smart cards. IEE Proceedings - E 138 3 (1993) 165-168
-
(1993)
IEE Proceedings - E
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
4
-
-
0028405583
-
A remote password authentication scheme based upon ElGamal's signature scheme
-
Chang C.C., and Liao W.Y. A remote password authentication scheme based upon ElGamal's signature scheme. Computers & Security 13 2 (1994) 137-144
-
(1994)
Computers & Security
, vol.13
, Issue.2
, pp. 137-144
-
-
Chang, C.C.1
Liao, W.Y.2
-
5
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Cryptography and coding, Springer-Verlag
-
Cocks C. An identity based encryption scheme based on quadratic residues. Cryptography and coding. LNCS vol. 2260 (2001), Springer-Verlag 360-363
-
(2001)
LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
6
-
-
84874800178
-
A public key cryptosystem and signature scheme based on the discrete logarithms
-
ElGamal T. A public key cryptosystem and signature scheme based on the discrete logarithms. IEEE Transaction on Information Theory 31 4 (1985) 469-472
-
(1985)
IEEE Transaction on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
7
-
-
84968502759
-
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
-
Frey G., and Ruck H. A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Mathematics of Computation 62 (1994) 865-874
-
(1994)
Mathematics of Computation
, vol.62
, pp. 865-874
-
-
Frey, G.1
Ruck, H.2
-
8
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Selected areas in cryptography'02, Springer-Verlag
-
Hess F. Efficient identity based signature schemes based on pairings. Selected areas in cryptography'02. LNCS vol. 2595 (2003), Springer-Verlag 310-324
-
(2003)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
9
-
-
0141642166
-
On the security of some password authentication protocols
-
Hsieh B.T., Sun H.M., and Hwang T. On the security of some password authentication protocols. Informatica 14 2 (2003) 195-204
-
(2003)
Informatica
, vol.14
, Issue.2
, pp. 195-204
-
-
Hsieh, B.T.1
Sun, H.M.2
Hwang, T.3
-
10
-
-
0036556279
-
Improvement on Peyravian-Zunic's password authentication schemes
-
Hwang J.J., and Yeh T.C. Improvement on Peyravian-Zunic's password authentication schemes. IEICE Transactions on Communications E85-B 4 (2002) 823-825
-
(2002)
IEICE Transactions on Communications
, vol.E85-B
, Issue.4
, pp. 823-825
-
-
Hwang, J.J.1
Yeh, T.C.2
-
12
-
-
33744757940
-
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
-
Ku W.C., Chen C.M., and Lee H.L. Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. ACM Operating Systems Review 37 4 (2003) 9-25
-
(2003)
ACM Operating Systems Review
, vol.37
, Issue.4
, pp. 9-25
-
-
Ku, W.C.1
Chen, C.M.2
Lee, H.L.3
-
13
-
-
33744725812
-
A hash-based strong-password authentication scheme without using smart cards
-
Ku W.C. A hash-based strong-password authentication scheme without using smart cards. ACM Operating Systems Review 38 1 (2004) 29-34
-
(2004)
ACM Operating Systems Review
, vol.38
, Issue.1
, pp. 29-34
-
-
Ku, W.C.1
-
14
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Communications of the ACM 24 11 (1981) 770-772
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
15
-
-
0041698517
-
A remote user authentication scheme using hash functions
-
Lee C.C., Li L.H., and Hwang M.S. A remote user authentication scheme using hash functions. ACM Operating Systems Review 36 4 (2002) 23-29
-
(2002)
ACM Operating Systems Review
, vol.36
, Issue.4
, pp. 23-29
-
-
Lee, C.C.1
Li, L.H.2
Hwang, M.S.3
-
18
-
-
0033704170
-
Methods for protecting password transmission
-
Peyravian M., and Zunic N. Methods for protecting password transmission. Computers & Security 19 5 (2000) 466-469
-
(2000)
Computers & Security
, vol.19
, Issue.5
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
19
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in cryptology - Crypto'84, Springer-Verlag
-
Shamir A. Identity-based cryptosystems and signature schemes. Advances in cryptology - Crypto'84. LNCS vol. 196 (1984), Springer-Verlag 47-53
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
21
-
-
0032137355
-
A password authentication methods for contents communication on the Internet
-
Shimizu A., Horioka T., and Inagaki H. A password authentication methods for contents communication on the Internet. IEICE Transactions on Communications E81-B 8 (1998) 1666-1673
-
(1998)
IEICE Transactions on Communications
, vol.E81-B
, Issue.8
, pp. 1666-1673
-
-
Shimizu, A.1
Horioka, T.2
Inagaki, H.3
|