-
1
-
-
77952329316
-
-
Ntl: a library for doing number theory
-
Ntl: a library for doing number theory. http://www.shoup. net/ntl/.
-
-
-
-
2
-
-
77952335842
-
-
Pbc library benchmarks
-
Pbc library benchmarks. http://crypto.stanford.edu/pbc/times.html.
-
-
-
-
3
-
-
84937427768
-
A new forward-secure digital signature scheme
-
M. Abdalla and L. Reyzin. A new forward-secure digital signature scheme. In Asiacrypt 2000, pages 116-129, 2000.
-
(2000)
Asiacrypt 2000
, pp. 116-129
-
-
Abdalla, M.1
Reyzin, L.2
-
6
-
-
0038223020
-
Forward integrity for secure audit logs
-
November, Computer Science and Engineering Department, University of San Diego
-
M. Bellare and B. Yee. Forward integrity for secure audit logs. In Technical Report, Computer Science and Engineering Department, University of San Diego, November 1997.
-
(1997)
Technical Report
-
-
Bellare, M.1
Yee, B.2
-
7
-
-
4344620574
-
Forward-security in private-key cryptography
-
M. Bellare and B. Yee. Forward-security in private-key cryptography. In Proc. of CT-RSA'03, 2003.
-
(2003)
Proc. of CT-RSA'03
-
-
Bellare, M.1
Yee, B.2
-
8
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
May
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In Proc. of Eurocrypt 2003, pages 416-432, May 2003.
-
(2003)
Proc. of Eurocrypt 2003
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
9
-
-
84946840347
-
Short signatures from the weil pairing
-
of Lecture Notes in Computer Science
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing. In Asiacrypt, volume 2248 of Lecture Notes in Computer Science, 2001.
-
(2001)
Asiacrypt
, vol.2248
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
11
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and siganture problems
-
August
-
A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and siganture problems. In Advances in Cryptology - CRYPTO'86, pages 186-194, August 1986.
-
(1986)
Advances in Cryptology - CRYPTO'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
12
-
-
84969368443
-
An identity-based key-exchange protocol
-
New York, NY, USA, Springer-Verlag New York, Inc
-
C. G. Günther. An identity-based key-exchange protocol. In EUROCRYPT '89: Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology, pages 29-37, New York, NY, USA, 1990. Springer-Verlag New York, Inc.
-
(1990)
EUROCRYPT '89: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology
, pp. 29-37
-
-
Günther, C.G.1
-
13
-
-
84872795246
-
Logcrypt: Forward security and public verification for secure audit logs
-
Darlinghurst, Australia, 2006. Australian Computer Society, Inc
-
J. E. Holt. Logcrypt: forward security and public verification for secure audit logs. In ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research, pages 203-211, Darlinghurst, Australia, 2006. Australian Computer Society, Inc.
-
ACSW Frontiers '06: Proceedings of the 2006 Australasian Workshops on Grid Computing and e-research
, pp. 203-211
-
-
Holt, J.E.1
-
14
-
-
77952405138
-
Forward security (adaptive cryptography: Time evolution)
-
G. Itkis. Forward security (adaptive cryptography: time evolution). Handbook of Information Security, 2006.
-
(2006)
Handbook of Information Security
-
-
Itkis, G.1
-
18
-
-
72749091644
-
Forward-secure signatures in untrusted update environments: Efficient and generic constructions
-
Oct
-
B. Libert, J. J. Quisquater, and M. Yung. Forward-secure signatures in untrusted update environments: efficient and generic constructions. In ACM CCS'07, Oct. 2007.
-
(2007)
ACM CCS'07
-
-
Libert, B.1
Quisquater, J.J.2
Yung, M.3
-
19
-
-
65349133168
-
Sequential aggregate signatures and multisignatures without random oracles
-
May
-
S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, and B. Waters. Sequential aggregate signatures and multisignatures without random oracles. In Prof. of Eurocrypt 2006, May 2006.
-
(2006)
Prof. of Eurocrypt 2006
-
-
Lu, S.1
Ostrovsky, R.2
Sahai, A.3
Shacham, H.4
Waters, B.5
-
20
-
-
34548794350
-
Sequential aggregate signatures from trapdoor permutations
-
November
-
A. Lysyanskaya, S. Micali, L. Reyzin, and H. Shacham. Sequential aggregate signatures from trapdoor permutations. In Proc. of Eurocrypt 2004, pages 245-254, November 2001.
-
(2001)
Proc. of Eurocrypt 2004
, pp. 245-254
-
-
Lysyanskaya, A.1
Micali, S.2
Reyzin, L.3
Shacham, H.4
-
22
-
-
84956984016
-
Efficient generic forward-secure signatures with an unbounded number of time periods
-
T. Malkin, D. Micciancio, and S. Miner. Efficient generic forward-secure signatures with an unbounded number of time periods. In Proc. of Eurocrypt (Eurocrypt'02), 2002.
-
(2002)
Proc. of Eurocrypt (Eurocrypt'02)
-
-
Malkin, T.1
Micciancio, D.2
Miner, S.3
|