메뉴 건너뛰기




Volumn 1025, Issue , 1995, Pages 264-269

Cryptanalysis of Harari's identification scheme

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTER PROGRAMMING;

EID: 84858239914     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-60693-9_28     Document Type: Conference Paper
Times cited : (6)

References (14)
  • 2
    • 77952288288 scopus 로고
    • A further improvement of the work factor in an attempt at breaking Mc Eliece's cryptosystem
    • A. Canteaut & H. Chabanne: A further improvement of the work factor in an attempt at breaking Mc Eliece's cryptosystem, Proceedings of Eurocode'94, (1994) 163-167
    • (1994) Proceedings of Eurocode'94 , pp. 163-167
    • Canteaut, A.1    Chabanne, H.2
  • 3
    • 84947903754 scopus 로고
    • On the Security Of Some Cryptosystems Based On Error-Correcting Codes
    • F. Chabaud: On the Security Of Some Cryptosystems Based On Error-Correcting Codes, Pre-proceedings of Eurocrypt'94, (1994) 127-135
    • (1994) Pre-proceedings of Eurocrypt'94 , pp. 127-135
    • Chabaud, F.1
  • 5
    • 84990731886 scopus 로고
    • How To Prove Yourself: Practiced Solutions to Identification and Signatures Problems
    • Lecture Notes in Computer Science
    • A. Fiat, A. Shamir: How To Prove Yourself: Practiced Solutions to Identification and Signatures Problems, Advances in Cryptology, Crypto'86, Lecture Notes in Computer Science 263, (1986) 186-194
    • (1986) Advances in Cryptology, Crypto'86 , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 6
    • 85015223738 scopus 로고
    • A (non-practical) three-pass identification protocol using coding theory
    • Lecture Notes in Computer Science
    • M. Giŕault: A (non-practical) three-pass identification protocol using coding theory, Advances in Cryptology, Auscrypt'90, Lecture Notes in Computer Science 453, (1990) 265-272
    • (1990) Advances in Cryptology, Auscrypt'90 , vol.453 , pp. 265-272
    • Giŕault, M.1
  • 8
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • L.C. Guillou and J.-J. Quisquater: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory, Advances in Cryptology, Eurocrypt'88, 330, (1988) 123-128
    • (1988) Advances in Cryptology, Eurocrypt'88 , vol.330 , pp. 123-128
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 9
    • 85015157728 scopus 로고
    • A New Authentication Algorithm
    • Lecture Notes in Computer Science
    • S. Harari: A New Authentication Algorithm, Proceedings of Coding Theory and Applications, Lecture Notes in Computer Science 388, (1988) 91-105
    • (1988) Proceedings of Coding Theory and Applications , vol.388 , pp. 91-105
    • Harari, S.1
  • 10
    • 0024078914 scopus 로고    scopus 로고
    • A probabilistic algorithm for computing minimum weights of large error-correcting codes
    • J.S. Leon: A probabilistic algorithm for computing minimum weights of large error-correcting codes, IEEE Trans. Inform. Theory, IT-34(5): 1354-1359
    • IEEE Trans. Inform. Theory , vol.IT-34 , Issue.5 , pp. 1354-1359
    • Leon, J.S.1
  • 12
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C.P. Schnorr: Efficient signature generation by smart cards, Journal of Cryptology, 4, (1991) 161-174
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.P.1
  • 13
    • 3342892176 scopus 로고    scopus 로고
    • A method for finding codewords of small weight
    • Lecture Notes in Computer Science
    • J. Stem: A method for finding codewords of small weight, Coding Theory and Applications, Lecture Notes in Computer Science 434, 173-180
    • Coding Theory and Applications , vol.434 , pp. 173-180
    • Stem, J.1
  • 14
    • 84955595109 scopus 로고
    • A new identification scheme based on syndrome decoding
    • Lecture Notes in Computer Science 773, Springer-Verlag
    • J. Stern: A new identification scheme based on syndrome decoding, Crypto'93, Lecture Notes in Computer Science 773, Springer-Verlag (1994) 13-21
    • (1994) Crypto'93 , pp. 13-21
    • Stern, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.