-
1
-
-
84937579774
-
The oracle diffie-hellman assumptions and an analysis of dhies
-
M. Abdalla, M. Bellare, and P. Rogaway. The oracle diffie-hellman assumptions and an analysis of dhies. Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, 2020:143-158, 2001.
-
(2001)
Topics in Cryptology - CT-RSA 2001, the Cryptographer's Track at RSA Conference 2001
, vol.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
2
-
-
84937579774
-
The oracle diffie-hellman assumptions and an analysis of dhies
-
M. Abdalla, M. Bellare, and P. Rogaway. The oracle diffie-hellman assumptions and an analysis of dhies. Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, 2020:143-158, 2001.
-
(2001)
Topics in Cryptology - CT-RSA 2001, the Cryptographer's Track at RSA Conference 2001
, vol.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
5
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
P. S. L. M. Barreto, H. Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, 2442:354-368, 2002.
-
(2002)
Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
7
-
-
33646770907
-
Theoretical analysis of xl over small fields
-
J.-M. C. Bo-Yin Yang. Theoretical analysis of xl over small fields. ACISP, 3108:277-288, 2004.
-
(2004)
ACISP
, vol.3108
, pp. 277-288
-
-
Yang, J.-M.C.B.-Y.1
-
9
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. SIAM J. of Computing, 32:586-615, 2003.
-
(2003)
SIAM J. of Computing
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
10
-
-
84946840347
-
Short signatures from the weil pairing
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the weil pairing. Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, 2248:514-532, 2001.
-
(2001)
Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
16
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
23
-
-
84974628135
-
The xtr public key system
-
A. K. Lenstra and E. R. Verheul. The xtr public key system. CRYPTO 2000, 1880:1-19, 2000.
-
(2000)
CRYPTO 2000
, vol.1880
, pp. 1-19
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
24
-
-
0022720533
-
Gaussian elimination is optimal for solving linear equations in dimension two
-
T. Lickteig. Gaussian elimination is optimal for solving linear equations in dimension two. Inf. Process. Lett., 22(6):277-279, 1986.
-
(1986)
Inf. Process. Lett.
, vol.22
, Issue.6
, pp. 277-279
-
-
Lickteig, T.1
-
25
-
-
3042553102
-
Non-interactive public-key cryptography
-
U. M. Maurer and Y. Yacobi. Non-interactive public-key cryptography. EUROCRYPT 1991, 547:498-507, 1991.
-
(1991)
EUROCRYPT 1991
, vol.547
, pp. 498-507
-
-
Maurer, U.M.1
Yacobi, Y.2
-
26
-
-
77954531503
-
-
MIRACL
-
MIRACL. http://www.shamus.ie/.
-
-
-
-
27
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
February
-
A. S. R. Rivest and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, A.S.R.1
Adleman, L.2
-
28
-
-
85020598353
-
Identity-based cryptosystems and signatures schemes
-
A. Shamir. Identity-based cryptosystems and signatures schemes. Advances in Cryptology - Crypto 1984, 196:47-53, 1984.
-
(1984)
Advances in Cryptology - Crypto 1984
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
30
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
F. Zhang, R. Safavi-Naini, and W. Susilo. An efficient signature scheme from bilinear pairings and its applications. Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, 2947:277-290, 2004.
-
(2004)
Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
|