-
1
-
-
4243114091
-
Efficient generation of shared RSA keys
-
D. Boneh and M. Ranklin, Efficient generation of shared RSA keys, Journal of the ACM, vol.48, no.4, pp.702-722, 2001.
-
(2001)
Journal of the ACM
, vol.48
, Issue.4
, pp. 702-722
-
-
Boneh, D.1
Ranklin, M.2
-
2
-
-
0027614601
-
A new generalized group-oriented cryptoscheme without truster center
-
C. C. Chang and H. C. Lee, A new generalized group-oriented cryptoscheme without truster center, IEEE Journal on Selected Area in Communications, vol.11, no.5, pp.725-729, 1993.
-
(1993)
IEEE Journal on Selected Area in Communications
, vol.11
, Issue.5
, pp. 725-729
-
-
Chang, C.C.1
Lee, H.C.2
-
3
-
-
48249140906
-
-
Dept. of CE, University of Feng Chia, Taiwan
-
C. Y. Chen and H. F. Lin, The design of a distributed RSA weakly undeniable blind multisignature using universal modulus, NSA TR-03-10-05, Dept. of CE, University of Feng Chia, Taiwan, 2003.
-
(2003)
The design of a distributed RSA weakly undeniable blind multisignature using universal modulus, NSA TR-03-10-05
-
-
Chen, C.Y.1
Lin, H.F.2
-
5
-
-
85022187530
-
Shared generation of authenticators and signatures
-
Y. Desmedt and Y. Frankel, Shared generation of authenticators and signatures, Crypto'91, pp.457-469, 1991.
-
(1991)
Crypto'91
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
6
-
-
0039241746
-
A practical protocol for large group-oriented networks
-
Y. Frankel, A practical protocol for large group-oriented networks, Eurocrypt'89, pp.56-61, 1989.
-
(1989)
Eurocrypt'89
, pp. 56-61
-
-
Frankel, Y.1
-
8
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin, Robust and efficient sharing of RSA functions, Crypto'96, pp.157-172, 1996.
-
(1996)
Crypto'96
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
9
-
-
84957104180
-
Two Party RSA Key Generation
-
Springer-Verlag, pp
-
N. Gilboa, Two Party RSA Key Generation, LNCS 1666, Springer-Verlag, pp.116-129, 1999.
-
(1999)
LNCS 1666
, pp. 116-129
-
-
Gilboa, N.1
-
10
-
-
0021757024
-
Strong RSA key
-
J. Gordan, Strong RSA key, Electronics Letters, vol.20, pp.514-516, 1984.
-
(1984)
Electronics Letters
, vol.20
, pp. 514-516
-
-
Gordan, J.1
-
11
-
-
84955593393
-
Group-oriented undeniable signature schemes without the assistance of a mutually trusted party
-
L. Harn and S. Yang, Group-oriented undeniable signature schemes without the assistance of a mutually trusted party, Auscrypt'92, pp.133-142, 1992.
-
(1992)
Auscrypt'92
, pp. 133-142
-
-
Harn, L.1
Yang, S.2
-
12
-
-
0028508211
-
Group-oriented (t, n) threshold digital signature scheme and digital multisignature
-
Sep
-
L. Harn, Group-oriented (t, n) threshold digital signature scheme and digital multisignature, IEE Proceedings Computers Digital Techniques, vol.141, no.5 pp.307-313, Sep.1994.
-
(1994)
IEE Proceedings Computers Digital Techniques
, vol.141
, Issue.5
, pp. 307-313
-
-
Harn, L.1
-
14
-
-
2942560952
-
Group-oriented signature scheme with distinguished signing authorities
-
C. L. Hsu, T. S. Wu and T. C. Wu, Group-oriented signature scheme with distinguished signing authorities, Future Generation Computer Systems, vol.20, no.5, pp.865-873, 2004.
-
(2004)
Future Generation Computer Systems
, vol.20
, Issue.5
, pp. 865-873
-
-
Hsu, C.L.1
Wu, T.S.2
Wu, T.C.3
-
15
-
-
63649106070
-
-
F.Huang, Y. Feng and X. Yu, A symmetric image encryption scheme based on a simple novel two-dimensional map, Int. J. of Innovative Computing, Information and Control, 3, no.6(B), pp.1593-1602, 2007.
-
F.Huang, Y. Feng and X. Yu, A symmetric image encryption scheme based on a simple novel two-dimensional map, Int. J. of Innovative Computing, Information and Control, vol.3, no.6(B), pp.1593-1602, 2007.
-
-
-
-
16
-
-
0026222898
-
Efficient method for generating strong primes with constraint of bit length
-
C. S. Laih, W. C. Yang and C. H. Chen, Efficient method for generating strong primes with constraint of bit length, Electronics Letters, vol.27, no.20, pp.1807-1808, 1991.
-
(1991)
Electronics Letters
, vol.27
, Issue.20
, pp. 1807-1808
-
-
Laih, C.S.1
Yang, W.C.2
Chen, C.H.3
-
17
-
-
48249116631
-
Group-oriented undeniable signature schemes with a trusted center
-
Kaohsiung, Taiwan, pp
-
N. Y. Lee and T. Hwang, Group-oriented undeniable signature schemes with a trusted center, Proc. of the 8th National Conference on Information Security, Kaohsiung, Taiwan, pp.234-243, 1998.
-
(1998)
Proc. of the 8th National Conference on Information Security
, pp. 234-243
-
-
Lee, N.Y.1
Hwang, T.2
-
18
-
-
84947809931
-
Generation of Shared RSA Keys by Two Parties
-
Springer-Verlag, pp
-
G. Poupard and J. Stern, Generation of Shared RSA Keys by Two Parties, LNCS 1514, Springer-Verlag, pp.11-24, 1998.
-
(1998)
LNCS
, vol.1514
, pp. 11-24
-
-
Poupard, G.1
Stern, J.2
-
19
-
-
84957689308
-
A simplified approach to threshold and proactive RSA
-
T. Rabin, A simplified approach to threshold and proactive RSA, Crypto'98, pp.89-104, 1998.
-
(1998)
Crypto'98
, pp. 89-104
-
-
Rabin, T.1
-
20
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystem
-
R. L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public key cryptosystem, CACM, vol.21, no.2, pp.120-126, 1978.
-
(1978)
CACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
22
-
-
0027961556
-
How to share a function securely
-
A. D. Santis, Y. Desmedt, Y. Frankel and M. Yung, How to share a function securely, Proc. of the 26th Annual Symp. on the Theory of Computing, pp.522-533, 1994.
-
(1994)
Proc. of the 26th Annual Symp. on the Theory of Computing
, pp. 522-533
-
-
Santis, A.D.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
23
-
-
33745147192
-
A group-Oriented anonymous signature scheme with subliminal channel, networking
-
J. Zhang, J. Zou and Y. Yang, A group-Oriented anonymous signature scheme with subliminal channel, networking, Sensing and Control, 2005 Proceedings, pp.49-53, 2005.
-
(2005)
Sensing and Control, 2005 Proceedings
, pp. 49-53
-
-
Zhang, J.1
Zou, J.2
Yang, Y.3
|