-
1
-
-
0345490607
-
Certificateless public key cryptography
-
Springer-Verlag, LNCS 2894
-
S. S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. In Proc. ASIACRYPT 2003, pages 452-473. Springer-Verlag, 2003. LNCS 2894.
-
(2003)
Proc. ASIACRYPT 2003
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
2
-
-
35048876343
-
Security proofs for identity-based identification and signature schemes
-
Springer-Verlag, LNCS 3027
-
M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. In Proc. EUROCRYPT 2004, pages 268-286. Springer-Verlag, 2004. LNCS 3027 (Full paper is available at Bellare's homepage URL: http://www-cse.ucsd.edu/users/mihir).
-
(2004)
Proc. EUROCRYPT 2004
, pp. 268-286
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
4
-
-
84956866842
-
Unknown key-share attacks on the station-to-station (STS) protocol
-
Springer-Verlag, LNCS 1560
-
S. Blake-Wilson and A. Menezes. Unknown key-share attacks on the station-to-station (STS) protocol. In Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, pages 154-170. Springer-Verlag, 1999. LNCS 1560.
-
(1999)
Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99
, pp. 154-170
-
-
Blake-Wilson, S.1
Menezes, A.2
-
5
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Springer-Verlag, LNCS 2139
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Proc. CRYPTO 2001, pages 213-229. Springer-Verlag, 2001. LNCS 2139.
-
(2001)
Proc. CRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, 31(4):469-472, 1985.
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
7
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attack
-
April
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attack. SIAM J. Computing, 17(2):281-308, April 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
8
-
-
33744786523
-
On the security of certificateless signature schemes from Asiacrypt 2003
-
Springer-Verlag, LNCS 3810
-
X. Huang, W. Susilo, Y. Mu, and F. Zhang. On the security of certificateless signature schemes from Asiacrypt 2003. In Cryptology and Network Security, 4th International Conference, CANS 2005, pages 13-25. Springer-Verlag, 2005. LNCS 3810.
-
(2005)
Cryptology and Network Security, 4th International Conference, CANS 2005
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
9
-
-
84927727752
-
Security proofs for signature schemes
-
LNCS 1070
-
D. Pointcheval and J. Stern. Security proofs for signature schemes. In Proc. EUROCRYPT 96, pages 387-398, 1996. LNCS 1070.
-
(1996)
Proc. EUROCRYPT 96
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
10
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer, LNCS 196
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Proc. CRYPTO 84, pages 47-53. Springer, 1984. LNCS 196.
-
(1984)
Proc. CRYPTO 84
, pp. 47-53
-
-
Shamir, A.1
|