-
1
-
-
84958744427
-
1-out-of-n signatures from a variety of keys
-
Springer-Verlag
-
M. Abe, M. Ohkubo, and K. Suzuki, "1-out-of-n signatures from a variety of keys", in ASIACRYPT'02, LNCS 2501, pp. 415-432, Springer-Verlag, 2002.
-
(2002)
ASIACRYPT'02, LNCS 2501
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
2
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
May
-
E. R. Berlekamp, R. J. McEliece, and H. C. van Tilborg, "On the inherent intractability of certain coding problems", IEEE Transactions on Information Theory, vol. 24, no. 3, May. 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
-
-
Berlekamp, E.R.1
McEliece, R.J.2
van Tilborg, H.C.3
-
3
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
Springer-Verlag
-
E. Bresson, J. Stern, and M. Szydlo, "Threshold ring signatures and applications to ad-hoc groups", in CRYPTO'02, LNCS 2442, 65-480, Springer-Verlag, 2002.
-
(2002)
CRYPTO'02, LNCS 2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
4
-
-
84929461941
-
How to achieve a McEliece-based digital signature scheme
-
Springer-Verlag
-
N. T. Courtois, M. Finiasz, and N. Sendrier, "How to achieve a McEliece-based digital signature scheme", ASIACRYPT'01, LNCS 2248, pp. 157-174, Springer-Verlag, 2001.
-
(2001)
ASIACRYPT'01, LNCS 2248
, pp. 157-174
-
-
Courtois, N.T.1
Finiasz, M.2
Sendrier, N.3
-
5
-
-
0346265013
-
Forking lemmas for ring signature schemes
-
Springer-verlag
-
J. Herranz and G. Saez, "Forking lemmas for ring signature schemes", in Indocrypt'03, LNCS 2904, pp. 266-279, Springer-verlag, 2003.
-
(2003)
Indocrypt'03, LNCS 2904
, pp. 266-279
-
-
Herranz, J.1
Saez, G.2
-
6
-
-
35048889048
-
A separa-ble threshold ring signature scheme
-
Springer-Verlag
-
J. K. Liu, V. K. Wei, and D. S. Wong, "A separa-ble threshold ring signature scheme", in ICISC'03, LNCS 2971, pp. 7-22, Springer-Verlag, 2004.
-
(2004)
ICISC'03, LNCS 2971
, pp. 7-22
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
8
-
-
84946833891
-
How to leak a secret
-
Springer-Verlag
-
R. L. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret", Asiacrypt'01, LNCS 2248, pp.552-565, Springer-Verlag, 2001.
-
(2001)
Asiacrypt'01, LNCS 2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
9
-
-
0025448457
-
Digital signature scheme based on error-correcting codes
-
X. M. Wang, "Digital signature scheme based on error-correcting codes", IEE Electronics Letters, vol. 26, no. 13, pp. 898-899, 1990.
-
(1990)
IEE Electronics Letters
, vol.26
, Issue.13
, pp. 898-899
-
-
Wang, X.M.1
-
10
-
-
0142218983
-
On the RS-code construction of ring signature schemes and a threshold setting of RST
-
Springer-Verlag
-
D. Wong, K. Fung, J. Liu, and V. Wei, "On the RS-code construction of ring signature schemes and a threshold setting of RST", in 5th International Con-ference on Information and Communication Security (ICICS'03), LNCS 2836, pp. 34-36, Springer-Verlag, 2003.
-
(2003)
5th International Con-ference on Information and Communication Security (ICICS'03), LNCS 2836
, pp. 34-36
-
-
Wong, D.1
Fung, K.2
Liu, J.3
Wei, V.4
-
11
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
Springer-Verlag
-
F. Zhang and K. Kim. "ID-based blind signature and ring signature from pairings", in ASIACRYPT'02, LNCS 2501, pp. 533-547, Springer-Verlag, 2002.
-
(2002)
ASIACRYPT'02, LNCS 2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
|