-
1
-
-
84958744427
-
1-out-of-n signatures from a variety of keys
-
Abe, M., Ohkubo, M., Suzuki, K.: 1-out-of-n signatures from a variety of keys. In: Advances in Cryptology-Asiacrypt 2002, pp. 415-432 (2002)
-
(2002)
Advances in Cryptology-Asiacrypt
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
2
-
-
24644493543
-
Proof systems for general systems of discrete logarithms
-
No, 260
-
Camenisch, J., Stadler, M.: Proof systems for general systems of discrete logarithms. ETH Technical Report No, 260 (1997), ftp://ftp.inf.ethz.ch/pub/ publications/tech-reports/
-
(1997)
ETH Technical Report
-
-
Camenisch, J.1
Stadler, M.2
-
5
-
-
0033321914
-
Public-key cryptosystems based on cubic finite field extensions
-
Gong, G., Harn, L.: Public-key cryptosystems based on cubic finite field extensions. IEEE Transaction on Information Theory 24, 2601-2605 (1999)
-
(1999)
IEEE Transaction on Information Theory
, vol.24
, pp. 2601-2605
-
-
Gong, G.1
Harn, L.2
-
8
-
-
34547164128
-
LFSR-based signatures with message recovery
-
Li, X., Zheng, D., Chen, K.: LFSR-based signatures with message recovery. Intenational Journal of Network Security 4(3), 266-270 (2007)
-
(2007)
Intenational Journal of Network Security
, vol.4
, Issue.3
, pp. 266-270
-
-
Li, X.1
Zheng, D.2
Chen, K.3
-
10
-
-
35048825874
-
Linkable spontaneous anonymous group signature for ad hoc groups
-
Information Security and Privacy-ACISP
-
Liu, J., Wei, V., Wong, D.: Linkable spontaneous anonymous group signature for ad hoc groups. In: Proceedings of Australasian Conf. Information Security and Privacy-ACISP 2004, pp. 325-335 (2004)
-
(2004)
Proceedings of Australasian Conf
, pp. 325-335
-
-
Liu, J.1
Wei, V.2
Wong, D.3
-
11
-
-
24944552663
-
Finite fields and cryptology
-
Dekker, New York, pp
-
Niederreiter, H.: Finite fields and cryptology. In: Proceedings of Finite fields,coding theory, and Advances in communications and computing, Dekker, New York, pp. 359-373 (1992)
-
(1992)
Proceedings of Finite fields,coding theory, and Advances in communications and computing
, pp. 359-373
-
-
Niederreiter, H.1
-
12
-
-
84946833891
-
How to leak a secret
-
Rivest, R., Shamir, A., Tauman, Y.: How to leak a secret. In: Advances in Cryptology-Asiacrypt 2001, pp. 552-565 (2001)
-
(2001)
Advances in Cryptology-Asiacrypt
, pp. 552-565
-
-
Rivest, R.1
Shamir, A.2
Tauman, Y.3
-
13
-
-
5044249037
-
A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms
-
Smith, P., Skinner, C.: A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms. In: Advances in Cryptology-Asiacrypt 1994, pp. 357-364 (1994)
-
(1994)
Advances in Cryptology-Asiacrypt
, pp. 357-364
-
-
Smith, P.1
Skinner, C.2
-
14
-
-
0141903381
-
On the n-th order shift register based discrete logarithm
-
Tan, C., Yi, X., Siew, C.: On the n-th order shift register based discrete logarithm. IEICE Transaction on Fundamentals E86-A(5), 1213-1216 (2003)
-
(2003)
IEICE Transaction on Fundamentals
, vol.E86-A
, Issue.5
, pp. 1213-1216
-
-
Tan, C.1
Yi, X.2
Siew, C.3
-
15
-
-
38149141274
-
-
Wei, V.: A bilinear spontaneous anonymous threshold signature for ad hoc groups. Cryptology ePrint Archive, 2004/039, http://eprint.iacr.org/
-
Wei, V.: A bilinear spontaneous anonymous threshold signature for ad hoc groups. Cryptology ePrint Archive, 2004/039, http://eprint.iacr.org/
-
-
-
-
16
-
-
0242613415
-
ID-Based blind signature and ring signature from pairings
-
Zhang, F., Kim, K.: ID-Based blind signature and ring signature from pairings. In: Advances in Cryptology-Asiacrypt 2002, pp. 535-547 (2002)
-
(2002)
Advances in Cryptology-Asiacrypt
, pp. 535-547
-
-
Zhang, F.1
Kim, K.2
-
17
-
-
33749986032
-
GDH group-based signature scheme with linkability. Communications
-
Zheng, D., Wei, V., Chen, K.: GDH group-based signature scheme with linkability. Communications, IEE Proceedings 153(5), 639-644
-
IEE Proceedings
, vol.153
, Issue.5
, pp. 639-644
-
-
Zheng, D.1
Wei, V.2
Chen, K.3
|