-
1
-
-
0003629991
-
-
FIPS 180-1, NIST, US Department of Commerce, Washington D.C., Apr.
-
FIPS 180-1, "Secure Hash Standard, " NIST, US Department of Commerce, Washington D.C., Apr. 1995.
-
(1995)
Secure Hash Standard
-
-
-
2
-
-
85076088264
-
-
Belgium, June
-
Bernard, A., and Degand, N., Images authentifie'es par camera sécurisée, Mémoire de fin d'études, Université catholique de Louvain, Louvain-la-Neuve, Belgium, June 1996.
-
(1996)
Images authentifie'Es Par Camera Sécurisée, Mémoire de Fin d'Études, Université Catholique de Louvain, Louvain-la-Neuve
-
-
Bernard, A.1
Degand, N.2
-
3
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
C. G. Gunther, Ed., vol. 330 of Lectures Notes in Computer Science, Springer-Verlag
-
Guillou, L. C., and Quisquater, J.-J., "A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory, " in Advance in Cryptology -Eurocrypt'88 (1988), C. G. Gunther, Ed., vol. 330 of Lectures Notes in Computer Science, Springer-Verlag, pp. 123-128.
-
(1988)
Advance in Cryptology -Eurocrypt'88
, pp. 123-128
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
4
-
-
84947558992
-
A 'paradoxical' identity-based signature scheme resulting from zeroknowledge
-
Goldwasser, Ed., vol. 403 of Lectures Notes in Computer Science, Springer-Verlag
-
Guillou, L. C., and Quisquater, J.-J., "A 'paradoxical' identity-based signature scheme resulting from zeroknowledge, " in Advance in Cryptology - Crypto '88 (1990), 5. Goldwasser, Ed., vol. 403 of Lectures Notes in Computer Science, Springer-Verlag, pp. 216-231.
-
(1990)
Advance in Cryptology - Crypto '88
, vol.5
, pp. 216-231
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
5
-
-
0004743526
-
The smard card: A standardized security device dedicated to public cryptology
-
G. J. Simmons, Ed., IEEE Press
-
Guillou, L. C., Ugon, M., and Quisquater, J.-J. "The smard card: A standardized security device dedicated to public cryptology, " In Contemporary cryptology - The science of information integrity (1992), G. J. Simmons, Ed., IEEE Press, pp. 561-613.
-
(1992)
Contemporary Cryptology - The Science of Information Integrity
, pp. 561-613
-
-
Guillou, L.C.1
Ugon, M.2
Quisquater, J.-J.3
-
6
-
-
85076086081
-
Efficient authentication of sequences with the SL2 hash function: Application to video sequences
-
Belgium, Sept.
-
Joye, M., and Quisquater, J.-J., "Efficient authentication of sequences with the SL2 hash function: Application to video sequences, " Technical Report CG-1996/8, UCL Crypto Group, Belgium, Sept. 1996.
-
(1996)
Technical Report CG-1996/8, UCL Crypto Group
-
-
Joye, M.1
Quisquater, J.-J.2
-
7
-
-
84862443304
-
An authenticated camera
-
ACM Press, December, to appear
-
Kelsey, J., Schneier, B., and Hall, C., "An authenticated camera, " in Proceedings of 12th Annual Computer Security Applications Conference, ACM Press, December 1996, to appear.
-
(1996)
Proceedings of 12th Annual Computer Security Applications Conference
-
-
Kelsey, J.1
Schneier, B.2
Hall, C.3
-
9
-
-
85016851762
-
Hashing with SL2
-
Y. Desmedt, Ed., vol. 839 of Lectures Notes in Computer Science, Springer-Verlag
-
Tillich, J.-P., and Zémor, G., "Hashing with SL2, " in Advance in Cryptology - Crypto'94 (1994), Y. Desmedt, Ed., vol. 839 of Lectures Notes in Computer Science, Springer-Verlag, pp. 40-49.
-
(1994)
Advance in Cryptology - Crypto'94
, pp. 40-49
-
-
Tillich, J.-P.1
Zémor, G.2
|