-
2
-
-
0004192381
-
-
CCRC in press, chapter 10
-
A. Menezes, P. V. Orschot, S. Vanstone," Handbook of Applied Cryptography", CCRC in press, chapter 10, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Orschot, P.V.2
Vanstone, S.3
-
3
-
-
77952404217
-
Digital signature Standard
-
National Institute of Science and Technology, Aug, available via
-
National Institute of Science and Technology, "Digital signature Standard", USA, Federal Information Processing Standard (FIPS) 186-2, Aug. 2001. (available via http://www.csrc.nist.gov/Cryptval.)
-
(2001)
USA, Federal Information Processing Standard (FIPS) 186-2
-
-
-
4
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Trans., Inf., Theory, pp. 469-472, 1985.
-
(1985)
IEEE Trans., Inf., Theory
, pp. 469-472
-
-
Elgamal, T.1
-
5
-
-
34648839354
-
-
N, Koblitz.: Elliptic Curve Cryptography, Math. Computation, 48, pp203-209,1987.
-
N, Koblitz.: "Elliptic Curve Cryptography", Math. Computation, vol.48, pp203-209,1987.
-
-
-
-
6
-
-
0024864204
-
-
N, Koblitz.: Hyper elliptic Curve Cryptography, J. Cryptology, 1, no. 3, pp139-150, 1989.
-
N, Koblitz.: "Hyper elliptic Curve Cryptography", J. Cryptology, vol. 1, no. 3, pp139-150, 1989.
-
-
-
-
7
-
-
63449122349
-
Digital Signcryption or How to Achieve Cost (Signature & Encryption)ℛ Cost (Signature)+ Cost (Encryption), Advances in Cryptology - Crypto 97
-
Springer, pp
-
Y.D Zheng, "Digital Signcryption or How to Achieve Cost (Signature & Encryption)ℛ Cost (Signature)+ Cost (Encryption)", Advances in Cryptology - Crypto 97, LNCS 1294, Springer, pp.165-179, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.D.1
-
8
-
-
0001462346
-
Signcryption and its application in efficient public key solutions
-
Y.Zheng, "Signcryption and its application in efficient public key solutions.", Advances in cryptogy- crypto'97, Vol.12, pp.165-179, 1997.
-
(1997)
Advances in cryptogy- crypto'97
, vol.12
, pp. 165-179
-
-
Zheng, Y.1
-
9
-
-
34548344510
-
Efficient Signcryption Schemes On Elliptic Curves
-
Y.Zheng, " Efficient Signcryption Schemes On Elliptic Curves.", Advances in cryptogy-crypto'2000, Vol.10, pp. 15-19,2000.
-
(2000)
Advances in cryptogy-crypto'2000
, vol.10
, pp. 15-19
-
-
Zheng, Y.1
-
10
-
-
34648845561
-
Signcryption scheme for Identity based cryptosystems
-
Technical Report CSTR-02-004, Department of Computer Science, Univ. of Bristol, Jun
-
D. Nalla, K. C. Reddy. "Signcryption scheme for Identity based cryptosystems ", Technical Report CSTR-02-004, Department of Computer Science, Univ. of Bristol, Jun 2004.
-
(2004)
-
-
Nalla, D.1
Reddy, K.C.2
-
11
-
-
34648845561
-
Signcryption scheme for Identity based cryptosystems
-
Technical Report CSTR-02-004, Department of Computer Science, Univ. of Bristol, Jun
-
D. Nalla, K. C. Reddy. "Signcryption scheme for Identity based cryptosystems ", Technical Report CSTR-02-004, Department of Computer Science, Univ. of Bristol, Jun 2004.
-
(2004)
-
-
Nalla, D.1
Reddy, K.C.2
-
12
-
-
34648868180
-
-
J. M. Lee. Identity Based Signcryption , Cryptology Print Archive, Report 2002, 098, 2002.
-
J. M. Lee. "Identity Based Signcryption ", Cryptology Print Archive, Report 2002, 098, 2002.
-
-
-
-
13
-
-
34648850631
-
An Improved Identification scheme
-
G. Yao, G. Wang, Y. Wang," An Improved Identification scheme", Computer Science and Applied Logic, Vol.23, 397-405, 2004.
-
(2004)
Computer Science and Applied Logic
, vol.23
, pp. 397-405
-
-
Yao, G.1
Wang, G.2
Wang, Y.3
-
14
-
-
46249097085
-
-
H.Elkamchouchi, A.Emarah, E.Hagras. A New Public Key Signcrypted Challenge Response Identification Protocol Using Smart Card, accepted in The 2006 International Conference on Computer Engineering and Systems (ICCES'06), Egypt 2006.
-
H.Elkamchouchi, A.Emarah, E.Hagras. "A New Public Key Signcrypted Challenge Response Identification Protocol Using Smart Card", accepted in "The 2006 International Conference on Computer Engineering and Systems (ICCES'06)", Egypt 2006.
-
-
-
-
15
-
-
34648853734
-
-
J. Daemen and R. Rijmen,Rijndael: The Advanced Encryption Standard, Dr. Dobb's Journal, pp. 137-139, Mar. 2001. (available via http://www.nist.gov/CryptoToolkit.).
-
J. Daemen and R. Rijmen,"Rijndael: The Advanced Encryption Standard", Dr. Dobb's Journal, pp. 137-139, Mar. 2001. (available via http://www.nist.gov/CryptoToolkit.).
-
-
-
-
17
-
-
0003602325
-
Request for Comments (RFC) 1320, Internet Activities Board
-
Internet Privacy Task Force, April
-
R.L. Rivest, "The MD4 Message-Digest Algorithm," Request for Comments (RFC) 1320, Internet Activities Board, Internet Privacy Task Force, April 1992.
-
(1992)
-
-
Rivest, R.L.1
-
18
-
-
0003602325
-
Request for Comments (RFC) 1321, Internet Activities Board
-
Internet Privacy Task Force, April
-
R.L. Rivest, "The MD5 Message-Digest Algorithm," Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.
-
(1992)
-
-
Rivest, R.L.1
-
19
-
-
34648868181
-
Secure Hash Standard, USA
-
National Institute of Science and Technology, April
-
National Institute of Science and Technology, "Secure Hash Standard," USA, Federal Information Processing Standard (FIPS) 180-1, April 1995
-
(1995)
Federal Information Processing Standard (FIPS)
, vol.180 -1
-
-
-
20
-
-
34648842537
-
Secure Hash Standard, USA
-
National Institute of Science and Technology, Aug
-
National Institute of Science and Technology, "Secure Hash Standard," USA, Federal Information Processing Standard (FIPS) 180-2, Aug. 2002.
-
(2002)
Federal Information Processing Standard (FIPS)
, vol.180 -2
-
-
-
21
-
-
46649116741
-
A New Secure Hash Dynamic Structure Algorithm (SHDSA) For Public Key Digital signature Standard
-
Menoufya Univ, Egypt
-
H.Elkamchouchi, A.Emarah, E.Hagras. "A New Secure Hash Dynamic Structure Algorithm (SHDSA) For Public Key Digital signature Standard ", National Radio Science Conference (NRSC 2006), March 14 -16, 2006, faculty of Electronic Engineering, Menoufya Univ., Egypt.
-
National Radio Science Conference (NRSC 2006), March 14 -16, 2006, faculty of Electronic Engineering
-
-
Elkamchouchi, H.1
Emarah, A.2
Hagras, E.3
-
22
-
-
35048891868
-
Keyed hash functions for message authentication
-
M. Bellare, "Keyed hash functions for message authentication", In Advances in Cryptology - CRYPTO'96 Vol. 1109, pp. 1-15, 1996.
-
(1996)
Advances in Cryptology - CRYPTO'96
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
-
23
-
-
84947237328
-
On the security of joint signature and encryption', Advances in Cryptology - Eurocrypt 02
-
Springer, pp
-
J.H. An, Y. Dodis, T. Rabin," On the security of joint signature and encryption"', Advances in Cryptology - Eurocrypt 02, LNCS 2332, Springer, pp. 83-107, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
24
-
-
35048876343
-
Security Proofs for Identity Based Identification and Signature Schemes
-
Springer-Verlag
-
M. Bellare, C. Namprempre, G. Neven,"Security Proofs for Identity Based Identification and Signature Schemes", Advances in Cryptology, EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology, EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
|