-
1
-
-
84990731886
-
How to prove yourself, practical solution to identification and signature problem's
-
Springer, Verlag, pp
-
A. Fiat and A.Shamir," How to prove yourself, practical solution to identification and signature problem's ", Advances in cryptology - crypto'86, LNCS'263, Springer, Verlag, pp.186-194, 1987.
-
(1987)
Advances in cryptology - crypto'86, LNCS'263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
2
-
-
12344258539
-
Efficient signature generation for smart cards
-
C.P.Schonrr, "Efficient signature generation for smart cards", Journal of cryptology, Vol.4, No.3, pp. 161-174, 1991.
-
(1991)
Journal of cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schonrr, C.P.1
-
3
-
-
0000537828
-
Efficient identification and signature for smart cards
-
C.P.Schonrr, "Efficient identification and signature for smart cards.", Advances in cryptology- crypto'89, Vol.4, No.3, pp. 239-251, 1989.
-
(1989)
Advances in cryptology- crypto'89
, vol.4
, Issue.3
, pp. 239-251
-
-
Schonrr, C.P.1
-
4
-
-
46249118469
-
Practical identification schemes as Secure as the DL and RSA problems
-
March
-
T. Okamoto, "Practical identification schemes as Secure as the DL and RSA problems", Advances in cryptology- crypto'99, March 1999, pp 35-42, 1999.
-
(1999)
Advances in cryptology- crypto'99
, pp. 35-42
-
-
Okamoto, T.1
-
5
-
-
84974680547
-
ESION: An efficient digital signature implementation for smart cards
-
Advances in cryptology, Eurocrypt'91, Springer-Verlag, pp
-
A. Fujisaki, S. Miyaguchi and T. Okamoto: "ESION: an efficient digital signature implementation for smart cards", Advances in cryptology - Eurocrypt'91,Lecture Notes in Computer Science 547, Springer-Verlag, pp. 446-457, 1992
-
(1992)
Lecture Notes in Computer Science
, vol.547
, pp. 446-457
-
-
Fujisaki, A.1
Miyaguchi, S.2
Okamoto, T.3
-
7
-
-
0001462346
-
Signcryption and its application in efficient public key solutions
-
Y.Zheng, " Signcryption and its application in efficient public key solutions.", Advances in cryptolgy-crypto'97. Vol.12, pp. 165-179, 1997
-
(1997)
Advances in cryptolgy-crypto'97
, vol.12
, pp. 165-179
-
-
Zheng, Y.1
-
8
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Trans., Inf., Theory, pp. 469-472, 1985.
-
(1985)
IEEE Trans., Inf., Theory
, pp. 469-472
-
-
Elgamal, T.1
-
9
-
-
0034318245
-
An Efficient remote user authentication scheme using smart card
-
Nov
-
H. M. Sun, "An Efficient remote user authentication scheme using smart card", IEEE Trans. On Consumer Electronics, Vol. 46, No. 4, pp. 958-960, Nov. 2000.
-
(2000)
IEEE Trans. On Consumer Electronics
, vol.46
, Issue.4
, pp. 958-960
-
-
Sun, H.M.1
-
10
-
-
46249117142
-
-
J. M. Lee. Identity Based Signcryption , Cryptology Print Archive, Report 2002, 098, 2002.
-
J. M. Lee. "Identity Based Signcryption ", Cryptology Print Archive, Report 2002, 098, 2002.
-
-
-
-
11
-
-
34648845561
-
Signcryption scheme for Identity based cryptosystems
-
Technical Report CSTR-02-004, Department of Computer Science, Univ. of Bristol, Jun
-
D. Nalla, K. C. Reddy. "Signcryption scheme for Identity based cryptosystems ", Technical Report CSTR-02-004, Department of Computer Science, Univ. of Bristol, Jun 2004.
-
(2004)
-
-
Nalla, D.1
Reddy, K.C.2
-
12
-
-
46249094554
-
-
Kenneth G. Paterson. ID-based signatures using elliptic curves. Advances in Cryptology, Print Archive, Report 2002/004, 2002.
-
Kenneth G. Paterson. "ID-based signatures using elliptic curves." Advances in Cryptology, Print Archive, Report 2002/004, 2002.
-
-
-
-
13
-
-
0013017020
-
Rijndael: The Advanced Encryption Standard
-
Mar
-
J. Daemen and R. Rijmen,"Rijndael: The Advanced Encryption Standard", Dr. Dobb's Journal, pp. 137- 139, Mar. 2001.
-
(2001)
Dr. Dobb's Journal
, pp. 137-139
-
-
Daemen, J.1
Rijmen, R.2
-
14
-
-
0003629991
-
Secure Hash Standard
-
National Institute of Science and Technology, Aug
-
National Institute of Science and Technology, "Secure Hash Standard", USA, Federal Information Processing Standard (FIPS) 180-2, Aug. 2002.
-
(2002)
USA, Federal Information Processing Standard (FIPS) 180-2
-
-
-
16
-
-
46249112869
-
-
A. Menezes, P. V. Orschot, S. Vanstone, Handbook of Applied Cryptography, CCRC in press, chapter 10 ,1997.
-
A. Menezes, P. V. Orschot, S. Vanstone," Handbook of Applied Cryptography", CCRC in press, chapter 10 ,1997.
-
-
-
-
17
-
-
35048891868
-
Keyed hash functions for message authentication
-
M. Bellare, "Keyed hash functions for message authentication", In Advances in Cryptology - CRYPTO'96 Vol. 1109, pp. 1-15.
-
Advances in Cryptology - CRYPTO'96
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
-
18
-
-
0003288228
-
On the Design and Security of Block Ciphers
-
Hartung-Gorre Verlag
-
Xuejia Lai, "On the Design and Security of Block Ciphers", ETH Series in Information Processing 1, Hartung-Gorre Verlag, 1992.
-
(1992)
ETH Series in Information Processing
, vol.1
-
-
Lai, X.1
-
19
-
-
63449122349
-
Digital Signcryption or How to Achieve Cost (Signature & Encryption) < Cost (Signature)+ Cost (Encryption)
-
Advances in Cryptology, Crypto'97, Springer, pp
-
Y. Zheng," Digital Signcryption or How to Achieve Cost (Signature & Encryption) < Cost (Signature)+ Cost (Encryption)", Advances in Cryptology - Crypto'97,LNCS 1294, Springer, pp.165-179, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
20
-
-
0004746654
-
On the security of a practical identification scheme
-
V. Shoup,"On the security of a practical identification scheme", Journal of cryptology Vol.12, No 4, pp.247-260, 1999.
-
(1999)
Journal of cryptology
, vol.12
, Issue.4
, pp. 247-260
-
-
Shoup, V.1
-
21
-
-
84947237328
-
On the security of joint signature and encryption
-
Advances in Cryptology, Eurocrypt'02, Springer, pp
-
J.H. An, Y. Dodis, T. Rabin," On the security of joint signature and encryption", Advances in Cryptology - Eurocrypt'02, LNCS 2332, Springer, pp. 83-107, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
22
-
-
34648850631
-
An Improved Identification scheme
-
G. Yao, G. Wang, Y. Wang," An Improved Identification scheme", Computer Science and Applied Logic, Vol.23, 397-405, 2004
-
(2004)
Computer Science and Applied Logic
, vol.23
, pp. 397-405
-
-
Yao, G.1
Wang, G.2
Wang, Y.3
-
23
-
-
35048876343
-
Security Proofs for Identity Based Identification and Signature Schemes
-
Springer-Verlag
-
M. Bellare, C. Namprempre, G. Neven," Security Proofs for Identity Based Identification and Signature Schemes", Advances in Cryptology, EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology, EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
|