메뉴 건너뛰기




Volumn 1560, Issue , 1999, Pages 69-81

Encrypted message authentication by firewalls

Author keywords

Authenticity; Confidentiality; Digital signatures; Encryption; Firewalls; Network security; Public key cryptography; Signcryption

Indexed keywords

AUTHENTICATION; CHROMIUM COMPOUNDS; COMPUTER SYSTEM FIREWALLS; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INFORMATION FILTERING; NETWORK SECURITY;

EID: 35048817852     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-49162-7_6     Document Type: Conference Paper
Times cited : (75)

References (30)
  • 9
    • 84956860618 scopus 로고    scopus 로고
    • Protocol failures related to order of encryption and signature - Computation of discrete logarithms in RSA groups
    • C. Boyd and E. Dawson, Springer-Verlag
    • M. Chen and E. Hughes. Protocol failures related to order of encryption and signature - computation of discrete logarithms in RSA groups. In C. Boyd and E. Dawson, editors, Information Security and Privacy - ACISP’98, volume 1438 of Lecture Notes in Computer Science, pages 238-249. Springer-Verlag, 1998.
    • (1998) Information Security and Privacy - ACISP’98, Volume 1438 of Lecture Notes in Computer Science , pp. 238-249
    • Chen, M.1    Hughes, E.2
  • 11
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • G. R. Blakley and D. Chaum, Springer-Verlag
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In G. R. Blakley and D. Chaum, editors, Advances in Cryptology - CRYPTO’84, volume 196 of Lecture Notes in Computer Science, pages 10-18. Springer-Verlag, 1985.
    • (1985) Advances in Cryptology - CRYPTO’84, Volume 196 of Lecture Notes in Computer Science , pp. 10-18
    • Elgamal, T.1
  • 12
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • July
    • T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31(4):469-472, July 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 15
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17(2):281-308, April 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 19
    • 0002670834 scopus 로고    scopus 로고
    • Message recovery for signature schemes based on the discrete logarithm problem
    • K. Nyberg and R. A. Rueppel. Message recovery for signature schemes based on the discrete logarithm problem. Designs, Codes and Cryptography, 7:61-81, 1996.
    • (1996) Designs, Codes and Cryptography , vol.7 , pp. 61-81
    • Nyberg, K.1    Rueppel, R.A.2
  • 21
    • 0031140709 scopus 로고    scopus 로고
    • Internet security: Firewalls and beyond
    • R. Oppliger. Internet security: Firewalls and beyond. Communications of the ACM, 40(5):92-102, May 1997.
    • (1997) Communications of the ACM , vol.40 , Issue.5 , pp. 92-102
    • Oppliger, R.1
  • 24
    • 84956868063 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 9:9-9, 1999.
    • (1999) Journal of Cryptology , vol.9 , pp. 9-9
    • Pointcheval, D.1    Stern, J.2
  • 26
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 28
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C.-P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.-P.1
  • 30
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost(Signature & encryption) C cost(signature) + cost(encryption)
    • B. S. Kaliski, Springer-Verlag
    • Y. Zheng. Digital signcryption or how to achieve cost(signature & encryption) C cost(signature) + cost(encryption). In B. S. Kaliski, editor, Advances in Cryptology - CRYPTO’97, volume 1294 of Lecture Notes in Computer Science, pages 165-179. Springer-Verlag, 1997.
    • (1997) Advances in Cryptology - CRYPTO’97, Volume 1294 of Lecture Notes in Computer Science , pp. 165-179
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.