-
1
-
-
84947237328
-
On the security of joint signature and encryption
-
Springer-Verlag, LNCS 2332
-
J.H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In Proc. EUROCRYPT 2002, pages 83-107. Springer-Verlag, 2002. LNCS 2332.
-
(2002)
Proc. EUROCRYPT 2002
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
2
-
-
84946837370
-
Key-privacy in public-key encryption
-
Springer-Verlag, LNCS 2248
-
M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval. Key-privacy in public-key encryption. In Proc. ASIACRYPT 2001, pages 566-582. Springer-Verlag, 2001. LNCS 2248.
-
(2001)
Proc. ASIACRYPT 2001
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
3
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Springer-Verlag, LNCS 1976
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Proc. ASIACRYPT 2000, pages 531-545. Springer-Verlag, 2000. LNCS 1976.
-
(2000)
Proc. ASIACRYPT 2000
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
5
-
-
84947906522
-
The exact security of digital signatures - How to sign with RSA and Rabin
-
Springer-Verlag, LNCS 1070
-
M. Bellare and P. Rogaway. The exact security of digital signatures - how to sign with RSA and Rabin. In Advances in Cryptology - Eurocrypt'06, pages 399-416. Springer-Verlag, 1996. LNCS 1070.
-
(1996)
Advances in Cryptology - Eurocrypt'06
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
35248874429
-
Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography
-
Springer-Verlag, LNCS 2729
-
X. Boyen. Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography. In Proc. CRYPTO 2003, pages 383-399. Springer-Verlag, 2003. LNCS 2729.
-
(2003)
Proc. CRYPTO 2003
, pp. 383-399
-
-
Boyen, X.1
-
8
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Springer-Verlag, LNCS 2045
-
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Proc. EUROCRYPT 2001, pages 453-474. Springer-Verlag, 2001. LNCS 2045. http://eprint.iacr.org/2001/040/.
-
(2001)
Proc. EUROCRYPT 2001
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
9
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attack
-
April
-
S. Goldwasser, S. Micalr, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attack. SIAM J. Computing, 17(2):281-308, April 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micalr, S.2
Rivest, R.3
-
10
-
-
33745810234
-
The internet key exchange (IKE) protocol 〈draft-ietf-ipsec-ikev2-00.txt〉
-
November
-
D. Harkins, C. Kaufman, and R. Perlman. The internet key exchange (IKE) protocol 〈draft-ietf-ipsec-ikev2-00.txt〉. INTERNET-DRAFT, November 2001.
-
(2001)
INTERNET-DRAFT
-
-
Harkins, D.1
Kaufman, C.2
Perlman, R.3
-
12
-
-
84927752554
-
Designated verifier proofs and their applications
-
LNCS 1070
-
M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In Proc. EUROCRYPT 96, pages 143-154, 1996. LNCS 1070.
-
(1996)
Proc. EUROCRYPT 96
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
February
-
R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
16
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Springer, LNCS 435
-
C. Schnorr. Efficient identification and signatures for smart cards. In Proc. CRYPTO 89, pages 239-252. Springer, 1990. LNCS 435.
-
(1990)
Proc. CRYPTO 89
, pp. 239-252
-
-
Schnorr, C.1
-
17
-
-
33645964923
-
Analysis and improvement of a signcryption scheme with key privacy
-
Springer-Verlag, LNCS 3650
-
G. Yang, D. Wong, and X. Deng. Analysis and improvement of a signcryption scheme with key privacy. In Proc. of the 8th Information Security Conference (ISC '05), pages 218-232. Springer-Verlag, 2005. LNCS 3650.
-
(2005)
Proc. of the 8th Information Security Conference (ISC '05)
, pp. 218-232
-
-
Yang, G.1
Wong, D.2
Deng, X.3
|