-
1
-
-
84959444946
-
Chameleon signatures
-
San Diego, CA, February
-
Krawczyk H, Rabin T. Chameleon signatures. In Proc. Symposium on Network and Distributed System Security Sympo sium (NDSS 3000), San Diego, CA, February, 2000, pp.143-154.
-
(2000)
Proc. Symposium on Network and Distributed System Security Sympo sium (NDSS 3000)
, pp. 143-154
-
-
Krawczyk, H.1
Rabin, T.2
-
2
-
-
35048873387
-
-
Ateniese G, de Medeiros B. Identity-based chameleon hash and applications. In Proc. Financial Cryptography (FC'04), Key West, Florida, USA, February 9-12, 2004, Springer-Verlag, LNCS 3110, pp.164-180.
-
Ateniese G, de Medeiros B. Identity-based chameleon hash and applications. In Proc. Financial Cryptography (FC'04), Key West, Florida, USA, February 9-12, 2004, Springer-Verlag, LNCS 3110, pp.164-180.
-
-
-
-
3
-
-
35048828982
-
Chameleon hashing without key exposure
-
Proc. the 7th Information Security Conference ISC'04, Palo Alto, USA, September 27-29, SpringerVerlag
-
Chen X, Zhang F, Kim K. Chameleon hashing without key exposure. In Proc. the 7th Information Security Conference (ISC'04), Palo Alto, USA, September 27-29, 2004, SpringerVerlag, LNCS 5225, pp.87-98.
-
(2004)
LNCS
, vol.5225
, pp. 87-98
-
-
Chen, X.1
Zhang, F.2
Kim, K.3
-
4
-
-
23944526438
-
On the key exposure problem in chameleon hashes
-
Proc. the 4th Conference on Security in Communication Networks SCN'04, Amalfi, Italy, September 8-10, Springer-Verlag
-
Ateniese G, de Medeiros B. On the key exposure problem in chameleon hashes. In Proc. the 4th Conference on Security in Communication Networks (SCN'04), Amalfi, Italy, September 8-10, 2004, Springer-Verlag, LNCS 5552, pp.165-179.
-
(2004)
LNCS
, vol.5552
, pp. 165-179
-
-
Ateniese, G.1
de Medeiros, B.2
-
5
-
-
35048882590
-
On simulation-sound trapdoor commitments
-
Proc. EUROCRYPT'04, Interlaken, Switzerland, May 2-6, Springer-Verlag
-
MacKenzie P, Yang K. On simulation-sound trapdoor commitments. In Proc. EUROCRYPT'04, Interlaken, Switzerland, May 2-6, 2004, Springer-Verlag, LNCS 5027, pp.382-400.
-
(2004)
LNCS
, vol.5027
, pp. 382-400
-
-
MacKenzie, P.1
Yang, K.2
-
6
-
-
26444461753
-
Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks
-
CRYPTO'04, Santa Barbara, California, USA, August 15-19, Springer-Verlag
-
Gennaro R. Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks. In CRYPTO'04, Santa Barbara, California, USA, August 15-19, 2004, Springer-Verlag, LNCS 3152, pp. 220-236.
-
(2004)
LNCS
, vol.3152
, pp. 220-236
-
-
Gennaro, R.1
-
7
-
-
18244402163
-
Implementation of cryptosystems based on Tate pairing
-
Hu L, Dong J, Pei D. Implementation of cryptosystems based on Tate pairing. J. Comput. Sci. & Technol, 2005, 20(2): 264-269.
-
(2005)
J. Comput. Sci. & Technol
, vol.20
, Issue.2
, pp. 264-269
-
-
Hu, L.1
Dong, J.2
Pei, D.3
-
8
-
-
0347802687
-
Digital signatures
-
Dobkin D, Jones A, Lipton R eds, New York: Academic Press
-
Rabin M. Digital signatures. Foundations of Secure Computation. Dobkin D, Jones A, Lipton R (eds.), New York: Academic Press, 1978, pp.155-168.
-
(1978)
Foundations of Secure Computation
, pp. 155-168
-
-
Rabin, M.1
-
9
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Fairfax, VA, November 3-5
-
Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In Proc. the 1st ACM Conf. Computer and Communications Security, Fairfax, VA, November 3-5, 1993, pp.62-73.
-
(1993)
Proc. the 1st ACM Conf. Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
10
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser S, Micali S, Rivest R. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 1998, 17(2): pp. 281-308.
-
(1998)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
11
-
-
35048876343
-
Security proofs for identity-based identification and signature schemes
-
Proc. Eurocrypt'2004, Interlaken, Switzerland, May 2-6, Springer-Verlag
-
Bellare M, Namprempre C, Neven G. Security proofs for identity-based identification and signature schemes. In Proc. Eurocrypt'2004, Interlaken, Switzerland, May 2-6, 2004, Springer-Verlag, LNCS 5027, pp. 268-286.
-
(2004)
LNCS
, vol.5027
, pp. 268-286
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
12
-
-
0000090958
-
The exact security of digital signatures: How to sign with RSA and Rabin
-
Proc. Eurocrypt 96, Zaragoza, Spain, May 12-16, Springer-Verlag
-
Bellare M, Rogaway P. The exact security of digital signatures: How to sign with RSA and Rabin. In Proc. Eurocrypt 96, Zaragoza, Spain, May 12-16, 1996, Springer-Verlag, LNCS 1070, pp.399-416.
-
(1996)
LNCS
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
13
-
-
84944898222
-
The representation problem based on factoring
-
Proc. the Cryptographer's Track at the RSA Conference on Topics in Cryptology 2002 Topics in Cryptology-CT-RSA 2002, San Jose, CA, USA, February 18-22, Springer-Verlag
-
Fischlin M, Fischlin R. The representation problem based on factoring. In Proc. the Cryptographer's Track at the RSA Conference on Topics in Cryptology 2002 (Topics in Cryptology-CT-RSA 2002), San Jose, CA, USA, February 18-22, 2002, Springer-Verlag, LNCS 2271, pp.96-113.
-
(2002)
LNCS
, vol.2271
, pp. 96-113
-
-
Fischlin, M.1
Fischlin, R.2
|