-
3
-
-
0001229355
-
A Forward-Secure Digital Signature Scheme
-
M. Bellare and S. K. Miner. A Forward-Secure Digital Signature Scheme. Crypto '99.
-
Crypto '99
-
-
Bellare, M.1
Miner, S.K.2
-
7
-
-
18744390904
-
On the Power of Claw-Free Permutations
-
Y. Dodis and L. Reyzin. On the Power of Claw-Free Permutations. SCN 2002.
-
SCN 2002
-
-
Dodis, Y.1
Reyzin, L.2
-
8
-
-
0000097412
-
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
-
A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Crypto '86.
-
Crypto '86
-
-
Fiat, A.1
Shamir, A.2
-
9
-
-
0038425881
-
Robust and Efficient Sharing of RSA Functions
-
R. Gennaro, T. Rabin, S. Jarecki, and H. Krawczyk. Robust and Efficient Sharing of RSA Functions. J. Crypto 13(2): 273-300 (2000).
-
(2000)
J. Crypto
, vol.13
, Issue.2
, pp. 273-300
-
-
Gennaro, R.1
Rabin, T.2
Jarecki, S.3
Krawczyk, H.4
-
10
-
-
84958813923
-
Relaxing Tamper-Resistance Requirements for Smart Cards Using (Auto)-Proxy Signatures
-
M. Girault. Relaxing Tamper-Resistance Requirements for Smart Cards Using (Auto)-Proxy Signatures. CARDIS '98.
-
CARDIS '98
-
-
Girault, M.1
-
11
-
-
35248837190
-
Self-Delegation with Controlled Propagation - Or - What if You Lose Your Laptop?
-
O. Goldreich, B. Pfitzmann, and R. L. Rivest. Self-Delegation with Controlled Propagation - or - What if You Lose Your Laptop? Crypto '98.
-
Crypto '98
-
-
Goldreich, O.1
Pfitzmann, B.2
Rivest, R.L.3
-
12
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
S. Goldwasser, S. Micali, and R. L. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Computing 17(2): 281-308 (1988).
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
13
-
-
0001654317
-
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessors Minimizing Both Transmission and Memory
-
L. C. Guillou and J.-J. Quisquater. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessors Minimizing Both Transmission and Memory. Eurocrypt '88.
-
Eurocrypt '88
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
15
-
-
70549087421
-
Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions
-
G. Itkis. Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. SCN 2002.
-
SCN 2002
-
-
Itkis, G.1
-
16
-
-
84871980827
-
SiBIR: Signer-Base Intrusion-Resilient Signatures
-
G. Itkis and L. Reyzin. SiBIR: Signer-Base Intrusion-Resilient Signatures. Crypto 2002.
-
Crypto 2002
-
-
Itkis, G.1
Reyzin, L.2
-
18
-
-
84969357100
-
Threshold Crytptosystems Based on Factoring
-
J. Katz and M. Yung. Threshold Crytptosystems Based on Factoring. Asiacrypt 2002.
-
Asiacrypt 2002
-
-
Katz, J.1
Yung, M.2
-
19
-
-
35248860958
-
Secure Key-Evolving Protocols for Discrete Logarithm Schemes
-
C.-F. Lu and S. W. Shieh. Secure Key-Evolving Protocols for Discrete Logarithm Schemes. RSA 2002.
-
RSA 2002
-
-
Lu, C.-F.1
Shieh, S.W.2
-
21
-
-
35248819012
-
On Concrete Security Treatment of Signatures Derived from Identification
-
K. Ohta and T. Okamoto. On Concrete Security Treatment of Signatures Derived from Identification. Crypto '98.
-
Crypto '98
-
-
Ohta, K.1
Okamoto, T.2
-
22
-
-
0001859260
-
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
-
T. Okamoto. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. Crypto '92.
-
Crypto '92
-
-
Okamoto, T.1
-
23
-
-
0004743525
-
Fast Signature Generation with a Fiat-Shamir-Like Scheme
-
H. Ong and C. Schnorr. Fast Signature Generation with a Fiat-Shamir-Like Scheme. Eurocrypt '90.
-
Eurocrypt '90
-
-
Ong, H.1
Schnorr, C.2
-
26
-
-
12344258539
-
Efficient Signature Generation by Smart Cards
-
C.P. Schnorr. Efficient Signature Generation by Smart Cards. J. Crypto 4(3): 161-174 (1991).
-
(1991)
J. Crypto
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
27
-
-
85086291924
-
t-root Identification and Signatures
-
t-root Identification and Signatures. Crypto '96.
-
Crypto '96
-
-
Schnorr, C.P.1
-
28
-
-
0001827537
-
Identity-Based Cryptosystems and Signature Schemes
-
A. Shamir. Identity-Based Cryptosystems and Signature Schemes. Crypto '84.
-
Crypto '84
-
-
Shamir, A.1
-
29
-
-
0004746654
-
On the Security of a Practical Identification Scheme
-
V. Shoup. On the Security of a Practical Identification Scheme. J. Crypto 12(4): 247-160 (1999).
-
(1999)
J. Crypto
, vol.12
, Issue.4
, pp. 247-1160
-
-
Shoup, V.1
|