-
2
-
-
84947913130
-
Generating ElGamal Signatures Without Knowing the Secret Key
-
Springer-Verlag
-
Daniel Bleichenbacher, "Generating ElGamal Signatures Without Knowing the Secret Key", Advances in C'ryptology: Eurocrypi '96, Springer-Verlag, pp. 10-18, 1996.
-
(1996)
Advances in C'ryptology: Eurocrypi '96
, pp. 10-18
-
-
Bleichenbacher, Daniel1
-
3
-
-
84957355967
-
On the Importance of Checking Cryptographic Protocols for Faults
-
Dan Boneh, Richard A. Demillo, Richard J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults", Advances in C'ryptology: Eurocrypi '97, pp. 37-51, 1997.
-
(1997)
Advances in C'ryptology: Eurocrypi '97
, pp. 37-51
-
-
Boneh, Dan1
Demillo, Richard A.2
Lipton, Richard J.3
-
5
-
-
0028462933
-
Threshold Cryptography
-
July
-
Y. Desmedt, "Threshold Cryptography", European Transactions on Telecommunications, Vol. 5, No. 4, pp. 449-457, July, 1994.
-
(1994)
European Transactions on Telecommunications
, vol.5
, Issue.4
, pp. 449-457
-
-
Desmedt, Y.1
-
7
-
-
0003508562
-
-
FIPS 186, Federal Information Processing Standards Publication 185, U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, Virginia
-
FIPS 186, "Digital Signature Standard", Federal Information Processing Standards Publication 185, U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, Virginia, 1994.
-
(1994)
Digital Signature Standard
-
-
-
9
-
-
0025849585
-
How to Time-Stamp a Digital Document
-
S. Haber, W.S. Stornetta, "How to Time-Stamp a Digital Document", Journal of C'ryptology, Vol. 3, No. 2, pp. 99-111, 1991.
-
(1991)
Journal of C'ryptology
, vol.3
, Issue.2
, pp. 99-111
-
-
Haber, S.1
Stornetta, W.S.2
-
10
-
-
0030646698
-
Proactive Public Key and Signature Systems
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, "Proactive Public Key and Signature Systems", in Proceedings of the 4th ACM Conference on Computer and Communications Security, 1997.
-
(1997)
Proceedings of the 4th ACM Conference on Computer and Communications Security
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
-
11
-
-
0011917214
-
-
JTU-T Recommendation X.509, International Telecommunication Union, Geneva, Switzerland, November, (equivalent to ISO/IEC 9594-8:1990&1995)
-
JTU-T Recommendation X.509, "The Directory-Authentication Framework" International Telecommunication Union, Geneva, Switzerland, November, 1993. (equivalent to ISO/IEC 9594-8:1990&1995)
-
(1993)
The Directory-Authentication Framework
-
-
-
13
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Springer-Verlag
-
Paul Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems", Advances in C'ryptology: Crypto '96, pp. 104-113, Springer-Verlag.
-
Advances in C'ryptology: Crypto '96
, pp. 104-113
-
-
Kocher, Paul1
-
15
-
-
0019634370
-
Password Authentication with Insecure Communication
-
L. Lamport, "Password Authentication with Insecure Communication", Communications of the A CM, 24, pp. 770-772, 1981.
-
(1981)
Communications of the A CM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
17
-
-
85180814169
-
Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
-
February (work in progress)
-
M. Myers, R. Ankney, "Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP", IETF PKIX Working Group Internet Draft, February 1998 (work in progress).
-
(1998)
IETF PKIX Working Group Internet Draft
-
-
Myers, M.1
Ankney, R.2
-
18
-
-
85034631130
-
An Efficient Signature Scheme Based on Quadratic Equations
-
H. Ong, C.P. Schnorr, A. Shamir, "An Efficient Signature Scheme Based on Quadratic Equations", Proceedings of the 16th Annual ACM Symposium on Theory of Computing, pp. 208-216, 1984.
-
(1984)
Proceedings of the 16th Annual ACM Symposium on Theory of Computing
, pp. 208-216
-
-
Ong, H.1
Schnorr, C.P.2
Shamir, A.3
-
21
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key C'ryp-tosystems
-
R. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key C'ryp-tosystems", Communications of the ACM, 21, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
|