-
1
-
-
60349106736
-
-
ANSI X9.31, 1998. Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA).
-
ANSI X9.31, 1998. Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA).
-
-
-
-
2
-
-
60349111550
-
-
ANSI X9.62, 1998. Public Key Cryptography for the Financial Service Industry-The Elliptic Curve Digital Signature Algorithm (ECDSA). Draft.
-
ANSI X9.62, 1998. Public Key Cryptography for the Financial Service Industry-The Elliptic Curve Digital Signature Algorithm (ECDSA). Draft.
-
-
-
-
3
-
-
60349126386
-
-
ANSI X9.63, 2001. Public Key Cryptography for the Financial Services Industry-Key Agreement and Key Transport Using Elliptic Curve Cryptography.
-
ANSI X9.63, 2001. Public Key Cryptography for the Financial Services Industry-Key Agreement and Key Transport Using Elliptic Curve Cryptography.
-
-
-
-
4
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
M. Bellare A. Desai D. Pointcheval P. Rogaway 1998 Relations among notions of security for public-key encryption schemes LNCS 1462 26 45
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
5
-
-
0003442756
-
-
Cambridge University Press Cambridge, UK
-
Blake, I., Seroussi, G., Smart, N., 1999. Elliptic Curves in Cryptography. Cambridge University Press, Cambridge, UK. [doi:10.2277/ 0521653746]
-
(1999)
Elliptic Curves in Cryptography
-
-
Blake, I.1
Seroussi, G.2
Smart, N.3
-
6
-
-
33746095782
-
VSH, an efficient and provable collision-resistant hash function
-
S. Contini A.K. Lenstra R. Steinfeld 2006 VSH, an efficient and provable collision-resistant hash function LNCS 4004 165 182
-
(2006)
LNCS
, vol.4004
, pp. 165-182
-
-
Contini, S.1
Lenstra, A.K.2
Steinfeld, R.3
-
8
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal 1985 A public key cryptosystem and a signature scheme based on discrete logarithms LNCS 196 10 18
-
(1985)
LNCS
, vol.196
, pp. 10-18
-
-
ElGamal, T.1
-
9
-
-
84937570422
-
Self-certified public keys
-
M. Girault 1991 Self-certified public keys LNCS 547 490 497
-
(1991)
LNCS
, vol.547
, pp. 490-497
-
-
Girault, M.1
-
10
-
-
0035451175
-
New nonrepudiable threshold proxy signature scheme with known signers
-
2
-
C.L. Hsu T.S. Wu T.C. Wu 2001 New nonrepudiable threshold proxy signature scheme with known signers J. Syst. Software 58 2 119 124
-
(2001)
J. Syst. Software
, vol.58
, pp. 119-124
-
-
Hsu, C.L.1
Wu, T.S.2
Wu, T.C.3
-
11
-
-
0141518230
-
A secure nonrepudiable threshold proxy signature scheme with known signers
-
2
-
M.S. Hwang I.C. Lin J.L. Lu 2000 A secure nonrepudiable threshold proxy signature scheme with known signers Int. J. Inf. 11 2 1 8
-
(2000)
Int. J. Inf.
, vol.11
, pp. 1-8
-
-
Hwang, M.S.1
Lin, I.C.2
Lu, J.L.3
-
14
-
-
0008321437
-
-
IEEE P1363. The Institute of Electrical and Electronics Engineers, Inc. USA
-
IEEE P1363, 2000. Standard Specifications for Public Key Cryptography. The Institute of Electrical and Electronics Engineers, Inc., USA.
-
(2000)
Standard Specifications for Public Key Cryptography
-
-
-
15
-
-
60349120135
-
-
ISO/IEC 9798-3, 1993. Information Technology-Security Techniques-Entity Authentication Mechanism-Part 3: Entity Authentication Using a Public Key Algorithm. International Organization for Standardization.
-
ISO/IEC 9798-3, 1993. Information Technology-Security Techniques-Entity Authentication Mechanism-Part 3: Entity Authentication Using a Public Key Algorithm. International Organization for Standardization.
-
-
-
-
16
-
-
60349096219
-
-
ISO/IEC 14888-3, 1998. Information Technology-Security Techniques-Digital Signature with Appendix-Part 3: Certificate-based Mechanisms. International Organization for Standardization.
-
ISO/IEC 14888-3, 1998. Information Technology-Security Techniques-Digital Signature with Appendix-Part 3: Certificate-based Mechanisms. International Organization for Standardization.
-
-
-
-
17
-
-
60349092591
-
-
ISO/IEC 15946-3, 2002. Information Technology-Security Techniques-Cryptographic Techniques Based on Elliptic Curves-Part 3: Key Establishment. International Organization for Standardization.
-
ISO/IEC 15946-3, 2002. Information Technology-Security Techniques-Cryptographic Techniques Based on Elliptic Curves-Part 3: Key Establishment. International Organization for Standardization.
-
-
-
-
18
-
-
0012497782
-
Elliptic curves and cryptography
-
4
-
A. Jurisic A.J. Menezes 1997 Elliptic curves and cryptography Dr. Dobb's J. 22 4 26 35
-
(1997)
Dr. Dobb's J.
, vol.22
, pp. 26-35
-
-
Jurisic, A.1
Menezes, A.J.2
-
19
-
-
0010567510
-
Proxy Signatures, Revised
-
Springer Berlin
-
Kim, S., Park, S., Won, D., 1997. Proxy Signatures, Revised. Proc. Int. Conf. on Information and Communications Security. Springer, Berlin, p.223-232.
-
(1997)
Proc. Int. Conf. on Information and Communications Securit
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
20
-
-
84968503742
-
Elliptic curve cryptosystems
-
177
-
N. Koblitz 1987 Elliptic curve cryptosystems Math. Comput. 48 177 203 209
-
(1987)
Math. Comput.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
22
-
-
0003777824
-
-
Department of Electronic Engineering, Massachusetts Institute of Technology USA
-
Kohnfelder, L.M., 1978. Toward a Practical Public-key Cryptosystem. BS Thesis, Department of Electronic Engineering, Massachusetts Institute of Technology, USA.
-
(1978)
Toward a Practical Public-key Cryptosystem
-
-
Kohnfelder, L.M.1
-
23
-
-
84956860632
-
On Zhang's nonrepudiable proxy signature schemes
-
N.Y. Lee T. Hwang C.H. Wang 1998 On Zhang's nonrepudiable proxy signature schemes LNCS 1438 415 422
-
(1998)
LNCS
, vol.1438
, pp. 415-422
-
-
Lee, N.Y.1
Hwang, T.2
Wang, C.H.3
-
24
-
-
33749071950
-
Multi-proxy Signature Schemes for Partial Delegation with Cheater Identification
-
IOS Press Amsterdam, Netherlands
-
Lin, C.Y., Wu, T.C., Hwang, J.J., 2002. Multi-proxy Signature Schemes for Partial Delegation with Cheater Identification. The Second Int. Workshop for Asia Public Key Infrastructure. IOS Press, Amsterdam, Netherlands, p.147-152.
-
(2002)
The Second Int. Workshop for Asia Public Key Infrastructure
, pp. 147-152
-
-
Lin, C.Y.1
Wu, T.C.2
Hwang, J.J.3
-
25
-
-
0029717329
-
-
Proxy Signature for Delegating Signing Operation [doi:10.1145/238168. 238185]
-
Mambo, M., Usuda, K., Okamoto, E., 1996a. Proxy Signature for Delegating Signing Operation. Proc. 3rd ACM Conf. on Computer and Communications Security, p.48-57. [doi:10.1145/238168.238185]
-
(1996)
Proc. 3rd ACM Conf. on Computer and Communications Security
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
28
-
-
84944878354
-
-
CRC Press, Inc. USA
-
Menezes, A., Oorschot, P., Vanstone, S., 1997. Handbook of Applied Cryptography. CRC Press, Inc., USA.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Oorschot, P.2
Vanstone, S.3
-
29
-
-
84955582446
-
On the risk of disruption in several multiparty signature schemes
-
M. Michels P. Horster 1996 On the risk of disruption in several multiparty signature schemes LNCS 1163 334 345
-
(1996)
LNCS
, vol.1163
, pp. 334-345
-
-
Michels, M.1
Horster, P.2
-
30
-
-
85015402934
-
Use of elliptic curves in cryptography
-
V. Miller 1985 Use of elliptic curves in cryptography LNCS 218 417 426
-
(1985)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
31
-
-
0027316628
-
-
Proxy-based Authorization and Accounting for Distributed Systems [doi:10.1109/ICDCS.1993.287698]
-
Neuman, B.C., 1993. Proxy-based Authorization and Accounting for Distributed Systems. Proc. 13th Int. Conf. on Distributed Computing Systems, p.283-291. [doi:10.1109/ICDCS.1993.287698]
-
(1993)
Proc. 13th Int. Conf. on Distributed Computing Systems
, pp. 283-291
-
-
Neuman, B.C.1
-
32
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir 1984 Identity-based cryptosystems and signature schemes LNCS 196 47 53
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
35
-
-
2942594446
-
A nonrepudiable threshold multi-proxy multisignature scheme with shared verification
-
5
-
S.F. Tzeng C.Y. Yang M.S. Hwang 2004 A nonrepudiable threshold multi-proxy multisignature scheme with shared verification Fut. Gen. Comput. Syst. 20 5 887 893
-
(2004)
Fut. Gen. Comput. Syst.
, vol.20
, pp. 887-893
-
-
Tzeng, S.F.1
Yang, C.Y.2
Hwang, M.S.3
-
36
-
-
0026156775
-
-
An Analysis of the Proxy Problem in Distributed System [doi:10.1109/RISP.1991.130793]
-
Varadharajan, V., Allen, P., Black, S., 1991. An Analysis of the Proxy Problem in Distributed System. Proc. IEEE Computer Society Symp. on Research in Security and Privacy, p.255-275. [doi:10.1109/RISP.1991.130793]
-
(1991)
Proc. IEEE Computer Society Symp. on Research in Security and Privacy
, pp. 255-275
-
-
Varadharajan, V.1
Allen, P.2
Black, S.3
-
39
-
-
0033875604
-
Proxy multi-signature scheme: a new type of proxy signature scheme
-
6
-
L.J. Yi G.Q. Bai G.Z. Xiao 2000 Proxy multi-signature scheme: a new type of proxy signature scheme Electron. Lett. 36 6 527 528
-
(2000)
Electron. Lett.
, vol.36
, pp. 527-528
-
-
Yi, L.J.1
Bai, G.Q.2
Xiao, G.Z.3
|