-
1
-
-
50849114523
-
Fast batch verification for modular exponen-tiation and digital signatures
-
Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
-
Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponen-tiation and digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS,vol. 1403, pp. 236-250. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 236-250
-
-
Bellare, M.1
Garay, J.A.2
Rabin, T.3
-
2
-
-
84946840347
-
Short signatures from the weil pairing
-
Boyd,C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd,C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg(2001)
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
3
-
-
84937411766
-
Attacking and repairing batch verification schemes
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Hei-delberg
-
Boyd, C., Pavlovski, C.: Attacking and repairing batch verification schemes. In:Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 58-71. Springer, Hei-delberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 58-71
-
-
Boyd, C.1
Pavlovski, C.2
-
4
-
-
0242696192
-
-
Buchegger, S., Boudec, J.-Y.L.: Performance analysis of the CONFIDANT protocol (Cooperation of Nodes: Fairness In Dynamic Ad-hoc NeTworks). In:ACM/SIGMOBILE Third International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC). ACM, New York (2002)
-
Buchegger, S., Boudec, J.-Y.L.: Performance analysis of the CONFIDANT protocol (Cooperation of Nodes: Fairness In Dynamic Ad-hoc NeTworks). In:ACM/SIGMOBILE Third International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC). ACM, New York (2002)
-
-
-
-
5
-
-
38049146172
-
-
Camenisch, J., Hohenberger, S., Pedersen, M.: Batch verification of short signatures. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, 4515, pp. 246-263.Springer, Heidelberg (2007); see also Cryptology ePrint Archive, Report 2007/172,2007, http://eprint.iacr.org/2007/172
-
Camenisch, J., Hohenberger, S., Pedersen, M.: Batch verification of short signatures. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 246-263.Springer, Heidelberg (2007); see also Cryptology ePrint Archive, Report 2007/172,2007, http://eprint.iacr.org/2007/172
-
-
-
-
6
-
-
35248844436
-
-
Cha, J., Cheon, J.: An identity-based signature from gap die-hellman groups. In:Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 18-30. Springer, Heidelberg (2002)
-
Cha, J., Cheon, J.: An identity-based signature from gap die-hellman groups. In:Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18-30. Springer, Heidelberg (2002)
-
-
-
-
7
-
-
1242310099
-
-
Fall, K.: A delay-tolerant network architecture for challenged internets. In:SIGCOMM 2003: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 27-34 (2003)
-
Fall, K.: A delay-tolerant network architecture for challenged internets. In:SIGCOMM 2003: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 27-34 (2003)
-
-
-
-
8
-
-
67650224819
-
On the practicalityof short signature batch verification. Cryptology ePrint Archive
-
Report 2008/015
-
Ferrara, A.L., Green, M., Hohenberger, S., Pedersen, M.O.: On the practicalityof short signature batch verification. Cryptology ePrint Archive, Report 2008/015 (2008), http://eprint.iacr.org/2008/015
-
(2008)
-
-
Ferrara, A.L.1
Green, M.2
Hohenberger, S.3
Pedersen, M.O.4
-
9
-
-
84921021973
-
-
Fiat, A.: Batch RSA. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, 435, pp.175-185. Springer, Heidelberg (1990)
-
Fiat, A.: Batch RSA. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp.175-185. Springer, Heidelberg (1990)
-
-
-
-
10
-
-
23944459661
-
-
Gaubatz, G., Kaps, J.-P., Sunar, B.: Public key cryptography in sensor networks-revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westho, D. (eds.) ESAS2004. LNCS, 3313, pp. 2-18. Springer, Heidelberg (2005)
-
Gaubatz, G., Kaps, J.-P., Sunar, B.: Public key cryptography in sensor networks-revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westho, D. (eds.) ESAS2004. LNCS, vol. 3313, pp. 2-18. Springer, Heidelberg (2005)
-
-
-
-
11
-
-
34547553533
-
Canning spam in wireless gossip networks
-
Gavidia, D., van Steen, M., Gamage, C., Jesi, G.P.: Canning spam in wireless gossip networks. In: Conference on Wireless On demand Network Systems and Services (WONS), pp. 208-220 (2007)
-
(2007)
Conference on Wireless On demand Network Systems and Services (WONS)
, pp. 208-220
-
-
Gavidia, D.1
van Steen, M.2
Gamage, C.3
Jesi, G.P.4
-
12
-
-
33746734238
-
-
Granger, R., Page, D.L., Smart, N.P.: High security pairing-based cryptography revisited. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, 4076,pp. 480-494. Springer, Heidelberg (2006)
-
Granger, R., Page, D.L., Smart, N.P.: High security pairing-based cryptography revisited. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol. 4076,pp. 480-494. Springer, Heidelberg (2006)
-
-
-
-
13
-
-
33749564652
-
On computing products of pairings. Cryptology ePrint Archive
-
Report 2006/172
-
Granger, R., Smart, N.P.: On computing products of pairings. Cryptology ePrint Archive, Report 2006/172 (2006), http://eprint.iacr.org/2006/172
-
(2006)
-
-
Granger, R.1
Smart, N.P.2
-
14
-
-
38149073980
-
-
Law, L., Matt, B.J.: Finding invalid signatures in pairing based batches. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, 4887, pp. 35-53.Springer, Heidelberg (2007)
-
Law, L., Matt, B.J.: Finding invalid signatures in pairing based batches. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 35-53.Springer, Heidelberg (2007)
-
-
-
-
15
-
-
33646843415
-
-
Lee, S.-W., Cho, S., Choi, J., Cho, Y.: Batch verification with DSA-type digital signatures for ubiquitous computing. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS, 3802, pp. 125-130. Springer, Heidelberg (2005)
-
Lee, S.-W., Cho, S., Choi, J., Cho, Y.: Batch verification with DSA-type digital signatures for ubiquitous computing. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS, vol. 3802, pp. 125-130. Springer, Heidelberg (2005)
-
-
-
-
16
-
-
32244432588
-
Efficient identification of bad signatures in RSA-type batch signature
-
Lee, S., Cho, S., Choi, J., Cho, Y.: Efficient identification of bad signatures in RSA-type batch signature. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A(1), 74-80 (2006)
-
(2006)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E89-A
, Issue.1
, pp. 74-80
-
-
Lee, S.1
Cho, S.2
Choi, J.3
Cho, Y.4
-
17
-
-
78650297815
-
Identification of multiple invalid signatures in pairing-based batched signatures
-
Matt, B.J.: Identification of multiple invalid signatures in pairing-based batched signatures. Cryptology ePrint Archive (2009), http://eprint.iacr.org/2009
-
(2009)
Cryptology ePrint Archive
-
-
Matt, B.J.1
-
18
-
-
84948995055
-
-
Naccache, D., MRahi, D., Vaudenay, S., Raphaeli, D.: Can D.S.A. Be improved? In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, 950, pp. 77-85. Springer, Heidelberg (1995)
-
Naccache, D., MRahi, D., Vaudenay, S., Raphaeli, D.: Can D.S.A. Be improved? In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 77-85. Springer, Heidelberg (1995)
-
-
-
-
20
-
-
84957804123
-
-
Pastuszak, J., Michalek, D., Pieprzyk, J., Seberry, J.: Identification of bad signatures in batches. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, 1751, pp. 28-45. Springer, Heidelberg (2000)
-
Pastuszak, J., Michalek, D., Pieprzyk, J., Seberry, J.: Identification of bad signatures in batches. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 28-45. Springer, Heidelberg (2000)
-
-
-
-
21
-
-
33845726678
-
Securing vehicular ad hoc networks
-
Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks 15(1), 39-68 (2007)
-
(2007)
Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
22
-
-
0242527340
-
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
-
New York
-
Salem, N.B., Buttyan, L., Hubaux, J.-P., Jakobsson, M.: A charging and rewarding scheme for packet forwarding in multi-hop cellular networks, In:ACM/SIGMOBILE 4th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC). ACM Press, New York (2003)
-
(2003)
In:ACM/SIGMOBILE 4th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC). ACM Press
-
-
Salem, N.B.1
Buttyan, L.2
Hubaux, J.-P.3
Jakobsson, M.4
-
23
-
-
35349016950
-
Amoeba: Robust location privacy scheme for vanet
-
Sampigethaya, K., Mingyan, L., Leping, H., Poovendran, R.: Amoeba: Robust location privacy scheme for vanet. IEEE JSAC Special Issue on Vehicular Networks 25(8), 1569-1589 (2007)
-
(2007)
IEEE JSAC Special Issue on Vehicular Networks
, vol.25
, Issue.8
, pp. 1569-1589
-
-
Sampigethaya, K.1
Mingyan, L.2
Leping, H.3
Poovendran, R.4
-
24
-
-
0000211152
-
Class number, a theory of factorization and genera
-
AMS
-
Shanks, D.: Class number, a theory of factorization and genera. In: Symposium on Pure Mathematics, vol. 20, pp. 415-440. AMS (1971)
-
(1971)
Symposium on Pure Mathematics
, vol.20
, pp. 415-440
-
-
Shanks, D.1
-
25
-
-
67049122567
-
Attacking LCCC batch verification of RSA signatures. Cryptology ePrint Archive
-
Report 2006/111
-
Stanek, M.: Attacking LCCC batch verification of RSA signatures. Cryptology ePrint Archive, Report 2006/111 (2006), http://eprint.iacr.org/2006/ 111
-
(2006)
, pp. 111
-
-
Stanek, M.1
-
26
-
-
34247251606
-
-
draft-irtf-dtnrg-bundle-security-04 work in progress, September
-
Symington, S., Farrell, S., Weiss, H., Lovell, P.: Bundle security protocol specification. draft-irtf-dtnrg-bundle-security-04 (work in progress) (September 2007)
-
(2007)
Bundle security protocol specification
-
-
Symington, S.1
Farrell, S.2
Weiss, H.3
Lovell, P.4
-
27
-
-
67049089977
-
-
Wagner, D.: The conventional wisdom about sensor network security. is wrong. In: IEEE Security and Privacy 2005, and invited panelist, Security in Ad-hoc and Sensor Networks 2005 (2005)
-
Wagner, D.: The conventional wisdom about sensor network security. is wrong. In: IEEE Security and Privacy 2005, and invited panelist, Security in Ad-hoc and Sensor Networks 2005 (2005)
-
-
-
-
28
-
-
0029342134
-
Improved digital signature suitable for batch verification
-
Yen, S., Laih, C.: Improved digital signature suitable for batch verification. IEEE Transactions on Computers 44(7), 957-959 (1995)
-
(1995)
IEEE Transactions on Computers
, vol.44
, Issue.7
, pp. 957-959
-
-
Yen, S.1
Laih, C.2
-
29
-
-
24944445896
-
-
Yoon, H., Cheon, J.H., Kim, Y.: Batch verifications with ID-based signatures. In:Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, 3506, pp. 223-248. Springer,Heidelberg (2005)
-
Yoon, H., Cheon, J.H., Kim, Y.: Batch verifications with ID-based signatures. In:Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 223-248. Springer,Heidelberg (2005)
-
-
-
|