-
4
-
-
84947906522
-
The exact security of digital signatures: How to sign with RSA and Rabin
-
Lec. Notes in Comp. Sci, U. Maurer ed., Springer-Verlag
-
M. Bellare and P. Rogaway, "The exact security of digital signatures: How to sign with RSA and Rabin," Advances in Cryptology - Eurocrypt 96 Proceedings, Lec. Notes in Comp. Sci. Vol. 1070, U. Maurer ed., Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology - Eurocrypt 96 Proceedings
, vol.1070
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
0022716288
-
A simple unpredictable pseudo-random number generator
-
L. Blum, M. Blum and M. Shub, "A simple unpredictable pseudo-random number generator," SIAM Journal on Computing Vol. 15, No. 2, 364-383, May 1986.
-
(1986)
SIAM Journal on Computing
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
7
-
-
85023809951
-
Threshold cryptosystems
-
Lec. Notes in Comp. Sci, G. Brassard ed., Springer-Verlag
-
Y. Desmedt andY. Frankel, "Threshold cryptosystems." Advances in Cryp-tology - Crypto 89 Proceedings, Lec. Notes in Comp. Sci. Vol. 435, G. Brassard ed., Springer-Verlag, 1989.
-
(1989)
Advances in Cryp-Tology - Crypto 89 Proceedings
, vol.435
-
-
Desmedt, Y.1
Frankel, Y.2
-
8
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. van Oorsohot and M. Wiener, "Authentication and authenticated key exchanges," Designs, Codes and Cryptography, 2, 107-125 (1992).
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorsohot, P.2
Wiener, M.3
-
9
-
-
0024135240
-
Zero-knowledge proofs of identity
-
U. Feige, A. Fiat and A. Shamir, "Zero-knowledge proofs of identity," J. of Cryptology, 1(1988), 77-94.
-
(1988)
J. Of Cryptology
, vol.1
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
10
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Lec. Notes in Comp. Sci, A. Odlyzko ed., Springer-Verlag
-
A. Fiat. andA. Shamir, "How to prove yourself: Practical solutions to identification and signature problems," Advances in Cryptology - Crypto 86 Proceedings, Lec. Notes in Comp. Sci. Vol. 263, A. Odlyzko ed., Springer-Verlag, 1986.
-
(1986)
Advances in Cryptology - Crypto 86 Proceedings
, vol.263
-
-
Fiat, A.1
Shamir, A.2
-
11
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, andR. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," SIAM Journal of Computing, Vol. 17, No. 2, pp. 281-308, April 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
12
-
-
84969368443
-
An identity-based key-exchange protocol
-
Lec. Notes in Comp. Sci, J-J. Quisquater, J. Vandewille ed., Springer-Verlag
-
C. Günther, "An identity-based key-exchange protocol," Advances in Cryptology - Eurocrypt 89 Proceedings, Lec. Notes in Comp. Sci. Vol. 434, J-J. Quisquater, J. Vandewille ed., Springer-Verlag, 1989.
-
(1989)
Advances in Cryptology - Eurocrypt 89 Proceedings
, vol.434
-
-
Günther, C.1
-
13
-
-
9444274735
-
How to Time-Stamp a Digital Document
-
Lec. Notes in Comp. Sci, A. J. Menezes and S. Vanstone ed., Springer-Verlag
-
S. Haber and W. Stornetta, "How to Time-Stamp a Digital Document," Advances in Cryptology - Crypto 90 Proceedings, Lec. Notes in Comp. Sci. Vol. 537, A. J. Menezes and S. Vanstone ed., Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology - Crypto 90 Proceedings
, vol.537
-
-
Haber, S.1
Stornetta, W.2
-
14
-
-
0030646698
-
Proactive public key and signature schemes
-
ACM
-
A Herzberg, M. Jakobsson, S. Jarecki, H Krawczyk and M. Yung, "Proactive public key and signature schemes," Proceedings of the Fourth Annual Conference on Computer and Communications Security, ACM, 1997.
-
(1997)
Proceedings of the Fourth Annual Conference on Computer and Communications Security
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
15
-
-
84957705622
-
"On concrete security treatment of signatures derived from identification
-
Lec. Notes in Comp. Sci, H. Krawczyk ed., Springer-Verlag
-
K. Ohta and T. Okamoto. "On concrete security treatment of signatures derived from identification," Advances in Cryptology - Crypto 98 Proceedings, Lec. Notes in Comp. Sci. Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology - Crypto 98 Proceedings
, vol.1462
-
-
Ohta, K.1
Okamoto, T.2
-
16
-
-
0004743525
-
Fast signature generation with a Fiat-Shamir like scheme
-
Lec. Notes in Comp. Sci, I. Damgård ed., Springer-Verlag
-
H. Ong and C. Schnorr, "Fast signature generation with a Fiat-Shamir like scheme," Advances in Cryptology - Eurocrypt 90 Proceedings, Lec. Notes in Comp. Sci. Vol. 473, I. Damgård ed., Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology - Eurocrypt 90 Proceedings
, vol.473
-
-
Ong, H.1
Schnorr, C.2
-
17
-
-
84927727752
-
Security proofs for signature schemes
-
Lec. Notes in Comp. Sci, U. Maurer ed., Springer-Verlag
-
D. Pointcheval and J. Stern, "Security proofs for signature schemes," Advances in Cryptology - Eurocrypt 96 Proceedings, Lec. Notes in Comp. Sci. Vol. 1070, U. Maurer ed., Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology - Eurocrypt 96 Proceedings
, vol.1070
-
-
Pointcheval, D.1
Stern, J.2
-
18
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communications of the ACM, 22(1979), 612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
19
-
-
84947923743
-
On the security of a practical identification scheme
-
Lec. Notes in Comp. Sci, U. Maurer ed., Springer-Verlag
-
V. Shoup, "On the security of a practical identification scheme," Advances in Cryptology - Eurocrypt 96 Proceedings, Lec. Notes in Comp. Sci. Vol. 1070, U. Maurer ed., Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology - Eurocrypt 96 Proceedings
, vol.1070
-
-
Shoup, V.1
-
20
-
-
0019080452
-
A Modification of the RSA Public-key Encryption Procedure
-
H. Williams, "A Modification of the RSA Public-key Encryption Procedure," IEEE Transactions on Information Theory, Vol. IT-26, No. 6, 1980, pp. 726-729.
-
(1980)
IEEE Transactions on Information Theory
, vol.IT-26
, Issue.6
, pp. 726-729
-
-
Williams, H.1
|