메뉴 건너뛰기




Volumn 3960 LNCS, Issue , 2006, Pages 280-294

An optimal non-interactive message authentication protocol

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; FUNCTION EVALUATION; SECURITY OF DATA; HASH FUNCTIONS;

EID: 33745637238     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11605805_18     Document Type: Conference Paper
Times cited : (26)

References (18)
  • 3
    • 0025056443 scopus 로고
    • A discrete logarithm implementation of perfect zero-knowledge blobs
    • [BK90]
    • [BK90] Joan F. Boyar and Stuart A. Kurtz. A discrete logarithm implementation of perfect zero-knowledge blobs. Journal of Cryptology, 2(2):63-76, 1990.
    • (1990) Journal of Cryptology , vol.2 , Issue.2 , pp. 63-76
    • Boyar, J.F.1    Kurtz, S.A.2
  • 4
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • [BR93]. Douglas R. Stinson, editor, Advances in Cryptology - CRYPTO '93: 13th Annual International Cryptology Conference, Santa Barbara. California, U.S.A.. Springer-Verlag
    • [BR93] Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In Douglas R. Stinson, editor, Advances in Cryptology - CRYPTO '93: 13th Annual International Cryptology Conference, volume 773 of Lecture Notes in Computer Science. pages 232-249, Santa Barbara. California, U.S.A., 1993. Springer-Verlag.
    • (1993) Lecture Notes in Computer Science , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 23944521144 scopus 로고    scopus 로고
    • Manual aulhenlicalion for wireless devices
    • [GMN04], January
    • [GMN04] Christian Gehrmann, Chris J. Milchell, and Kaisa Nyberg. Manual aulhenlicalion for wireless devices. RSA Cryptobytes, 7(1):29-37, January 2004.
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Milchell, C.J.2    Nyberg, K.3
  • 9
    • 26444521554 scopus 로고    scopus 로고
    • On ihe possibilily of conslrucling meaningful hash collisions for public keys
    • [LdW05]. Colin Boyd and Juan Manuel Gonzalez Nielo, editors, ACISP '05: The 10th Australasian Conference on Information Security and Privacy, Brisbane, Auslralia. Springer-Verlag
    • [LdW05] Arjen K. Lensira and Benne de Weger. On ihe possibilily of conslrucling meaningful hash collisions for public keys. In Colin Boyd and Juan Manuel Gonzalez Nielo, editors, ACISP '05: The 10th Australasian Conference on Information Security and Privacy, volume 3574 of Lecture Notes in Computer Science, pages 267-279, Brisbane, Auslralia, 2005. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3574 , pp. 267-279
    • Lensira, A.K.1    De Weger, B.2
  • 11
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosily classes
    • [Pai99]. Jacques Stern, edilor, Advances in Cryptology - EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May. Springer
    • [Pai99] Pascal Paillier. Public-key cryptosystems based on composite degree residuosily classes. In Jacques Stern, edilor, Advances in Cryptology - EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques, volume 1592 of Lecture Notes in Computer Science, pages 223-238, Prague, Czech Republic, May 1999. Springer.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 13
    • 0003602325 scopus 로고
    • The MD5 message digesi algorithm
    • [Riv92],IETF
    • [Riv92] Ronald L. Rivest. The MD5 message digesi algorithm. Technical Report Internet RFC-1321,IETF, 1992.
    • (1992) Technical Report Internet , vol.RFC-1321
    • Rivest, R.L.1
  • 14
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • [Vau05]. Victor Shoup, editor, Advances in Cryptology - CRYPTO '05: The 25th Annual International Cryptology Conference, Santa Barbara, California, U.S.A., August. Springer-Verlag
    • [Vau05] Serge Vaudenay. Secure communications over insecure channels based on short authenticated strings. In Victor Shoup, editor, Advances in Cryptology - CRYPTO '05: The 25th Annual International Cryptology Conference, volume 3621 of Lecture Notes in Computer Science, pages 309-326, Santa Barbara, California, U.S.A., August 2005. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 309-326
    • Vaudenay, S.1
  • 17
    • 33745171465 scopus 로고    scopus 로고
    • Finding collisions in the full SHA1
    • [WYY05a]. Victor Shoup, editor. Advances in Cryptology - CRYPTO '05: The 25th Annual International Cryptology Conference, Santa Barbara. California, U.S.A.. Springer-Verlag
    • [WYY05a] Xiaoyun Wang, Yiqun Yin, and Hongbo Yu. Finding collisions in the full SHA1. In Victor Shoup, editor. Advances in Cryptology - CRYPTO '05: The 25th Annual International Cryptology Conference, volume 3621 of Lecture Notes in Computer Science, pages 17-36, Santa Barbara. California, U.S.A., 2005. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 17-36
    • Wang, X.1    Yin, Y.2    Yu, H.3
  • 18
    • 33745122987 scopus 로고    scopus 로고
    • Efficient collision search attackson SHA0
    • [WYY05b]. Victor Shoup, editor, Advances in Cryptology-CRYPTO'05: The 25th Annual International Cryptology Conference, Santa Barbara, California, U.S.A.. Springer-Verlag
    • [WYY05b] Xiaoyun Wang, Xiuyuan Yu, and L. Y. Yin. Efficient collision search attackson SHA0. In Victor Shoup, editor, Advances in Cryptology- CRYPTO'05: The 25th Annual International Cryptology Conference, volume 3621 of Lecture Notes in Computer Science, pages 1-16, Santa Barbara, California, U.S.A., 2005. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 1-16
    • Wang, X.1    Yu, X.2    Yin, L.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.