-
1
-
-
84889351757
-
How to Sign Digital Streams
-
R. Gennaro and P. Rohatchi, "How to Sign Digital Streams", Advances in Cryptology-CRYPTO'97, Lecture Notes in Computer Science 1249, Springer Verlag, pp. 180-197, 1997.
-
(1997)
Advances in Cryptology-Crypto'97, Lecture Notes in Computer Science 1249
, pp. 180-197
-
-
Gennaro, R.1
Rohatchi, P.2
-
2
-
-
0342395819
-
Multicast Security: A Taxonomy and some efficient Constructions
-
R. Canetti, J. Garay, G. Itkins, D. Micciancio, M. Naor, B. Pinkas, " Multicast Security: A Taxonomy and some efficient Constructions", IEEE INFOCOM'99.
-
IEEE INFOCOM'99
-
-
Canetti, R.1
Garay, J.2
Itkins, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
3
-
-
85175180620
-
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
-
A. Perrig, R. Canetti, J.D. Tygar, D. Song, " Efficient Authentication and Signing of Multicast Streams over Lossy Channels", ACM CCS'02, 2000.
-
(2000)
ACM CCS'02
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
4
-
-
35048864396
-
Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques
-
M. AI-Ibrahim and J. Pieprzyk, "Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques," in Networking-ICN 2001, First International Conference, Colmar, France, Lecture Notes in Computer Science, vol. 2094, P. Lorenz (ed), pp. 239-249, 2001.
-
(2001)
Networking-Icn 2001, First International Conference, Colmar, France, Lecture Notes in Computer Science
, vol.2094
, pp. 239-249
-
-
Ai-Ibrahim, M.1
Pieprzyk, J.2
-
5
-
-
85175172124
-
The BiBa One-Time Signature and Broadcast Authentication Protocol
-
A. Perrigo "The BiBa One-Time Signature and Broadcast Authentication Protocol". ACM, CCS'OI, Philadelphia, November 2001.
-
(2001)
. ACM, CCS'OI, Philadelphia
-
-
Perrigo, A.1
-
6
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
M. Bellare, A. Desai, D. Pointcheval and Rogaway A. "Relations among notions of security for public-key encryption schemes". In H. Krawczyk, editor, Advances in Cryptology-CRYPTO'98, Lecture Notes in Computer Science No. 1462, Springer-Verlag, pages 26-45, 1998.
-
(1998)
Advances in Cryptology-Crypto'98, Lecture Notes in Computer Science No. 1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, A.4
-
8
-
-
0027342095
-
The sibling intractable function family(SIFF): Notion, construction and applications
-
Y. Zheng, T. Hardjono and J. Pieprzyk. "The sibling intractable function family(SIFF): notion, construction and applications. IElCE 7rans. Jilundamentals, vol. E76-A:4-13, January 1993.
-
(1993)
Ielce 7Rans. Jilundamentals
, vol.76
-
-
Zheng, Y.1
Hardjono, T.2
Pieprzyk, J.3
-
9
-
-
35248822497
-
Verifiable secret sharing
-
Lecture Notes in Computer Science No. 1787. Springer-Verlag
-
J. Pieprzyk and E. Okamato. " Verifiable secret sharing", IClSC'99, Seoul, Korea, pages 169-183, Lecture Notes in Computer Science No. 1787. Springer-Verlag 1999.
-
(1999)
Iclsc'99, Seoul, Korea
, pp. 169-183
-
-
Pieprzyk, J.1
Okamato, E.2
-
10
-
-
84969346266
-
A Certified Digital Signature
-
Lecture Notes in Computer Science No. 435
-
R. Merkle. "A Certified Digital Signature", Advances in Cryptology-CRYPTO'89, pages 218-238 Springer-Verlag, 1989. Lecture Notes in Computer Science No. 435.
-
(1989)
Advances in Cryptology-Crypto'89
, pp. 218-238
-
-
Merkle, R.1
-
12
-
-
85175178060
-
RFC 2401: Security architecture for the Internet Security
-
S. Kent and R. Atkinson. RFC 2401: Security architecture for the Internet Security. Networking Group, IETF, November 1998. http://www.ietf.org.
-
(1998)
Networking Group, IETF
-
-
Kent, S.1
Atkinson, R.2
-
13
-
-
0023985465
-
A Digital signature Scheme Secure Aagainst Adaptive Chosen-message Attacks"
-
S. Goldwasser, S. Micai, and C. Rackoff, "A Digital signature Scheme Secure Aagainst Adaptive Chosen-message Attacks", SIAM Journal on Computing, 17 (1988).
-
(1988)
SIAM Journal on Computing
, vol.17
-
-
Goldwasser, S.1
Micai, S.2
Rackoff, C.3
-
16
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir, "How to share a secret", Communications the ACM, 22:612-613, November 1979.
-
(1979)
Communications the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
0022793132
-
How to construct random functions
-
October
-
Oded Goldreich, Shaft Goldwasser, and Silvio Micali, " How to construct random functions", Journal 01 the ACM, 33(4):792-807, October 1986.
-
(1986)
Journal 01 the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
18
-
-
85175145268
-
On-Iine/Off-Iine digital signatures
-
S. Even, O. Goldreich, S. Micali. "On-Iine/Off-Iine digital signatures", Journal 01 Cryptology, volume 9, number 1, winter 1996.
-
(1996)
Journal 01 Cryptology
, vol.9
, Issue.1
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
|