-
1
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. L. Rivest, et al., "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, pp. 120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
2
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password Authentication with Insecure Communication," Communications of the Acm, vol. 24, pp. 770-772, 1981.
-
(1981)
Communications of the Acm
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
4
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Feb
-
M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, pp. 28-30, Feb 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
5
-
-
0034318245
-
An efficient remote use authentication scheme using smart cards
-
H. M. Sun, "An efficient remote use authentication scheme using smart cards," Ieee Transactions on Consumer Electronics, vol. 46, pp. 958-961, 2000.
-
(2000)
Ieee Transactions on Consumer Electronics
, vol.46
, pp. 958-961
-
-
Sun, H.M.1
-
6
-
-
73349138552
-
Security enhancement on an improvement on two remote user authentication scheme using smart cards
-
ed: Springer Berlin Heidelberg
-
H. C. Hsiang, et al., "Security Enhancement on an Improvement on Two Remote User Authentication Scheme Using Smart Cards," in Advances in Communication and Networking Lecture Notes in Computer Science ed: Springer Berlin Heidelberg, 2009, pp. 65-73.
-
(2009)
Advances in Communication and Networking Lecture Notes in Computer Science
, pp. 65-73
-
-
Hsiang, H.C.1
-
7
-
-
0034317895
-
Cryptanalysis of a remote user authentication scheme using smart cards
-
C. K. Chan, "Cryptanalysis of a remote user authentication scheme using smart cards," Ieee Transactions on Consumer Electronics, vol. 46, pp. 992-993, 2000.
-
(2000)
Ieee Transactions on Consumer Electronics
, vol.46
, pp. 992-993
-
-
Chan, C.K.1
-
8
-
-
77957937072
-
Security improvement on a remote user Authentication scheme using smart cards
-
T.-H. Chen, et al., "Security improvement on a remote user Authentication scheme using smart cards," in: Proceedings of Information Security and Assurance (ISA), vol. CCIS 76, 2010.
-
(2010)
Proceedings of Information Security and Assurance (ISA)
, vol.CCIS 76
-
-
Chen, T.-H.1
-
11
-
-
84968503742
-
Elliptic curve cryptosystems
-
Jan
-
N. Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, pp. 203-209, Jan 1987.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
12
-
-
0348003132
-
The state of elliptic curve cryptography
-
N. Koblitz, et al., "The State of Elliptic Curve Cryptography," Designs, Codes and Cryptography, vol. 19, pp. 173-193, 2000.
-
(2000)
Designs, Codes and Cryptography
, vol.19
, pp. 173-193
-
-
Koblitz, N.1
-
13
-
-
0035898904
-
Cryptographic authentication protocols for smart cards
-
DOI 10.1016/S1389-1286(01)00165-7, PII S1389128601001657
-
L. C. Guillou, et al., "Cryptographic authentication protocols for smart cards," Computer Networks, vol. 36, pp. 437-451, 2001. (Pubitemid 32542285)
-
(2001)
Computer Networks
, vol.36
, Issue.4
, pp. 437-451
-
-
Guillou, L.C.1
Ugon, M.2
Quisquater, J.-J.3
-
14
-
-
35248885280
-
An end-to-end systems approach to elliptic curve cryptography
-
N. Gura, et al., "An end-to-end systems approach to elliptic curve cryptography," Cryptographic Hardware and Embedded Systems - Ches 2002, vol. 2523, pp. 349-365, 2002.
-
(2002)
Cryptographic Hardware and Embedded Systems - Ches 2002
, vol.2523
, pp. 349-365
-
-
Gura, N.1
-
15
-
-
21144452087
-
A low-power design for an elliptic curve digital signature chip
-
R. Schroeppel, et al., "A low-power design for an elliptic curve digital signature chip," Cryptographic Hardware and Embedded Systems - Ches 2002, vol. 2523, pp. 366-380, 2002.
-
(2002)
Cryptographic Hardware and Embedded Systems - Ches 2002
, vol.2523
, pp. 366-380
-
-
Schroeppel, R.1
-
16
-
-
1642411116
-
Primes generated by elliptic curves
-
PII S0002993903073118
-
G. Everest, et al., "Primes generated by elliptic curves," proceedings of the American Mathematical Society, vol. 132, pp. 955-963, 2004. (Pubitemid 38390065)
-
(2004)
Proceedings of the American Mathematical Society
, vol.132
, Issue.4
, pp. 955-963
-
-
Everest, G.1
Miller, V.2
Stephens, N.3
-
17
-
-
16244399467
-
One- and two-level densities for rational families of elliptic curves: Evidence for the underlying group symmetries
-
Jul
-
S. J. Miller, "One- and two-level densities for rational families of elliptic curves: evidence for the underlying group symmetries," Compositio Mathematica, vol. 140, pp. 952-992, Jul 2004.
-
(2004)
Compositio Mathematica
, vol.140
, pp. 952-992
-
-
Miller, S.J.1
-
18
-
-
33646781591
-
Do all elliptic curves of the same order have the same difficulty of discrete log?
-
DOI 10.1007/11593447-2, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
D. Jao, et al., "Do all elliptic curves of the same order have the same difficulty of discrete log?," Advances in Cryptology Asiacrypt 2005, vol. 3788, pp. 21-40, 2005. (Pubitemid 43763467)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788
, pp. 21-40
-
-
Jao, D.1
Miller, S.D.2
Venkatesan, R.3
-
19
-
-
28244469017
-
Analysis and improvement of an authenticated key exchange protocol for sensor networks
-
Nov
-
X. J. Tian, et al., "Analysis and improvement of an authenticated key exchange protocol for sensor networks," Ieee Communications Letters, vol. 9, pp. 970-972, Nov 2005.
-
(2005)
Ieee Communications Letters
, vol.9
, pp. 970-972
-
-
Tian, X.J.1
-
20
-
-
63049116480
-
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
-
J.-H. Yang and C.-C. Chang, "An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem," Computers & Security, vol. 28, pp. 138-143, 2009.
-
(2009)
Computers & Security
, vol.28
, pp. 138-143
-
-
Yang, J.-H.1
Chang, C.-C.2
-
24
-
-
59649083248
-
A more efficient and secure dynamic ID-based remote user authentication scheme
-
Y. Y. Wang, et al., "A more efficient and secure dynamic ID-based remote user authentication scheme," Computer Communications, vol. 32, pp. 583-585, 2009.
-
(2009)
Computer Communications
, vol.32
, pp. 583-585
-
-
Wang, Y.Y.1
-
25
-
-
4043152192
-
Further improvement of an efficient password based remote user authentication scheme using smart cards
-
May
-
E. J. Yoon, et al., "Further improvement of an efficient password based remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 50, pp. 612-614, May 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, pp. 612-614
-
-
Yoon, E.J.1
-
26
-
-
59649086399
-
Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
-
Mar 4
-
H. C. Hsiang and W. K. Shih, "Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards," Computer Communications, vol. 32, pp. 649-652, Mar 4 2009.
-
(2009)
Computer Communications
, vol.32
, pp. 649-652
-
-
Hsiang, H.C.1
Shih, W.K.2
-
27
-
-
0037211327
-
A new remote user authentication scheme for multi-server architecture
-
Jan
-
I. C. Lin, et al., "A new remote user authentication scheme for multi-server architecture," Future Generation Computer Systems, vol. 19, pp. 13-22, Jan 2003.
-
(2003)
Future Generation Computer Systems
, vol.19
, pp. 13-22
-
-
Lin, I.C.1
-
28
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
Nov
-
H. C. Hsiang and W. K. Shih, "Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment," Computer Standards & Interfaces, vol. 31, pp. 1118-1123, Nov 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 1118-1123
-
-
Hsiang, H.C.1
Shih, W.K.2
|