메뉴 건너뛰기




Volumn 2, Issue 2, 2012, Pages 77-89

High-speed high-security signatures

Author keywords

Edwards curves; Elliptic curves; Foolproof session keys; Signatures; Software side channels; Speed

Indexed keywords

AUTHENTICATION; DATA TRANSFER; GEOMETRY; SIDE CHANNEL ATTACK; SPEED;

EID: 84884478474     PISSN: 21908508     EISSN: 21908516     Source Type: Journal    
DOI: 10.1007/s13389-012-0027-1     Document Type: Article
Times cited : (402)

References (82)
  • 1
    • 84887213934 scopus 로고
    • 17th annual symposium on foundations of computer science
    • (no editor) See [65]
    • (no editor): 17th annual symposium on foundations of computer science, IEEE Computer Society, 1976. MR 56: 1766. See [65].
    • (1976) IEEE Computer Society , vol.56 , pp. 1766
  • 2
    • 84887213607 scopus 로고    scopus 로고
    • (no editor): Technical guideline TR-03111, elliptic curve cryptography, Citations in this document: §2
    • (no editor): Technical guideline TR-03111, elliptic curve cryptography (2009). URL: https://www. bsi. bund. de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03111/BSI-TR-03111_pdf. pdf?_blob=publicationFile. Citations in this document: §2.
    • (2009)
  • 5
    • 84873261523 scopus 로고    scopus 로고
    • Progress in cryptology-LATINCRYPT 2010, first international conference on cryptology and information security in Latin America, Puebla, Mexico, August 8-11, 2010, proceedings
    • (editors): Springer, ISBN 978-3-642-14711-1. See [60]
    • Abdalla, M., Barreto, P. S. L. M. (editors): Progress in cryptology-LATINCRYPT 2010, first international conference on cryptology and information security in Latin America, Puebla, Mexico, August 8-11, 2010, proceedings, Lecture Notes in Computer Science, 6212, Springer, 2010. ISBN 978-3-642-14711-1. See [60].
    • (2010) Lecture Notes in Computer Science , vol.6212
    • Abdalla, M.1    Barreto, P.S.L.M.2
  • 6
    • 84887213212 scopus 로고    scopus 로고
    • Advances in cryptology-ASIACRYPT 2010, 16th international conference on the theory and application of cryptology and information security, Singapore, December 5-9, 2010, proceedings
    • (editor): Springer, ISBN 978-3-642-17372-1. See [38]
    • Abe, M. (editor): Advances in cryptology-ASIACRYPT 2010, 16th international conference on the theory and application of cryptology and information security, Singapore, December 5-9, 2010, proceedings, Lecture Notes in Computer Science, 6477, Springer, 2010. ISBN 978-3-642-17372-1. See [38].
    • (2010) Lecture Notes in Computer Science , vol.6477
    • Abe, M.1
  • 9
    • 80053549028 scopus 로고    scopus 로고
    • message 32f519ad. 19609226@news. dial. pipex. com posted to sci. crypt, Citations in this document: §2
    • Barwood, G.: Digital signatures using elliptic curves, message 32f519ad. 19609226@news. dial. pipex. com posted to sci. crypt (1997). URL: http://groups. google. com/group/sci. crypt/msg/b28aba37180dd6c6. Citations in this document: §2.
    • (1997) Digital signatures using elliptic curves
    • Barwood, G.1
  • 10
    • 50849114523 scopus 로고    scopus 로고
    • Fast batch verification for modular exponentiation and digital signatures
    • Citations in this document: §5, §5, §5, §5, §5
    • Bellare, M., Garay, J. A., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures, in Eurocrypt'98 [63] (1998), 236-250. URL: http://cseweb. ucsd. edu/~mihir/papers/batch. html. Citations in this document: §5, §5, §5, §5, §5.
    • (1998) Eurocrypt'98 , Issue.63 , pp. 236-250
    • Bellare, M.1    Garay, J.A.2    Rabin, T.3
  • 12
    • 33745965912 scopus 로고    scopus 로고
    • PKC 2006, Citations in this document: §1, §1, §2, §2, §2, §2, §3
    • Bernstein, D. J.: Curve25519: new Diffie-Hellman speed records, in PKC 2006 [82] (2006), 207-228. URL: http://cr. yp. to/papers. html#curve25519. Citations in this document: §1, §1, §2, §2, §2, §2, §3.
    • (2006) Curve25519: New Diffie-Hellman speed records , Issue.82 , pp. 207-228
    • Bernstein, D.J.1
  • 14
    • 38149061268 scopus 로고    scopus 로고
    • Faster addition and doubling on elliptic curves
    • Citations in this document: §2, §2
    • Bernstein, D. J., Lange, T.: Faster addition and doubling on elliptic curves, in Asiacrypt 2007 [49] (2007), 29-50. URL: http://eprint. iacr. org/2007/286. Citations in this document: §2, §2.
    • (2007) Asiacrypt 2007 , Issue.49 , pp. 29-50
    • Bernstein, D.J.1    Lange, T.2
  • 16
    • 84887213660 scopus 로고
    • Advances in cryptology, proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, proceedings
    • (editors): Springer, Berlin, ISBN 3-540-15658-5. MR 86j: 94003. See [32]
    • Blakley, G. R., Chaum, D. (editors): Advances in cryptology, proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, proceedings, Lecture Notes in Computer Science, 196, Springer, Berlin, 1985. ISBN 3-540-15658-5. MR 86j: 94003. See [32].
    • (1985) Lecture Notes in Computer Science , vol.196
    • Blakley, G.R.1    Chaum, D.2
  • 18
    • 0000966673 scopus 로고    scopus 로고
    • Advances in cryptology-CRYPTO '89, 9th annual international cryptology conference, Santa Barbara, California, USA, August 20-24, 1989, proceedings
    • (editor): Springer, Berlin, ISBN 3-540-97317-6. MR 91b: 94002. See [73]
    • Brassard, G. (editor): Advances in cryptology-CRYPTO '89, 9th annual international cryptology conference, Santa Barbara, California, USA, August 20-24, 1989, proceedings, Lecture Notes in Computer Science, 435, Springer, Berlin, 1990. ISBN 3-540-97317-6. MR 91b: 94002. See [73].
    • (1990) Lecture Notes in Computer Science , vol.435
    • Brassard, G.1
  • 19
    • 85027967075 scopus 로고
    • Fast exponentiation with precomputation (extended abstract)
    • see also newer version [20], Citations in this document: §4
    • Brickell, E. F., Gordon, D. M., McCurley, K. S., Wilson, D. B.: Fast exponentiation with precomputation (extended abstract), in Eurocrypt'92 [72] (1993), 200-207; see also newer version [20]. URL: http://cr. yp. to/bib/entries. html#1993/brickell-exp. Citations in this document: §4.
    • (1993) Eurocrypt'92 , Issue.72 , pp. 200-207
    • Brickell, E.F.1    Gordon, D.M.2    McCurley, K.S.3    Wilson, D.B.4
  • 23
    • 72449122383 scopus 로고    scopus 로고
    • Cache-timing template attacks
    • Citations in this document: §1
    • Brumley, B. B., Hakala, R. M.: Cache-timing template attacks, in Asiacrypt 2009 [54] (2009), 667-684. Citations in this document: §1.
    • (2009) Asiacrypt 2009 , Issue.54 , pp. 667-684
    • Brumley, B.B.1    Hakala, R.M.2
  • 24
    • 84887213669 scopus 로고    scopus 로고
    • "Bushing", Hector Martin "marcan" Cantero, Segher Boessenkool, Sven Peter, PS3 epic fail, Citations in this document: §2
    • "Bushing", Hector Martin "marcan" Cantero, Segher Boessenkool, Sven Peter, PS3 epic fail (2010). URL: http://events. ccc. de/congress/2010/Fahrplan/attachments/1780_27c3_console_hacking_2010. pdf. Citations in this document: §2.
    • (2010)
  • 25
    • 0023266911 scopus 로고
    • Average-case results on heapsort
    • Citations in this document: §5
    • Carlsson S.: Average-case results on heapsort. BIT 27, 2-17 (1987) Citations in this document: §5.
    • (1987) Bit , vol.27 , pp. 2-17
    • Carlsson, S.1
  • 26
    • 70350662757 scopus 로고    scopus 로고
    • Fast elliptic-curve cryptography on the Cell Broadband Engine
    • Citations in this document: §3
    • Costigan, N., Schwabe, P.: Fast elliptic-curve cryptography on the Cell Broadband Engine, in Africacrypt 2009 [69] (2009), 368-385. URL: http://cryptojedi. org/users/peter/#celldh. Citations in this document: §3.
    • (2009) Africacrypt 2009 , vol.69 , pp. 368-385
    • Costigan, N.1    Schwabe, P.2
  • 27
    • 84948971456 scopus 로고
    • Efficient exponentiation using precomputation and vector addition chains
    • MR 1479665. Citations in this document: §5
    • de Rooij, P.: Efficient exponentiation using precomputation and vector addition chains, in Eurocrypt '94 [28] (1995), 389-399. MR 1479665. Citations in this document: §5.
    • (1995) Eurocrypt'94 , Issue.28 , pp. 389-399
    • de Rooij, P.1
  • 28
    • 84871531027 scopus 로고
    • Advances in cryptology-EUROCRYPT '94, workshop on the theory and application of cryptographic techniques, Perugia, Italy, May 9-12, 1994, proceedings
    • (editor): Springer, Berlin, ISBN 3-540-60176-7. MR 98h: 94001. See [27]
    • De Santis, A. (editor): Advances in cryptology-EUROCRYPT '94, workshop on the theory and application of cryptographic techniques, Perugia, Italy, May 9-12, 1994, proceedings, Lecture Notes in Computer Science, 950, Springer, Berlin, 1995. ISBN 3-540-60176-7. MR 98h: 94001. See [27], [59].
    • (1995) Lecture Notes in Computer Science , vol.950 , Issue.59
    • De Santis, A.1
  • 29
    • 84871590290 scopus 로고
    • Advances in cryptology-CRYPTO '94, 14th annual international cryptology conference, Santa Barbara, California, USA, August 21-25, 1994, proceedings
    • (editor):, Springer, Berlin,ISBN 3-540-58333-5. See [50]
    • Desmedt, Y. (editor): Advances in cryptology-CRYPTO '94, 14th annual international cryptology conference, Santa Barbara, California, USA, August 21-25, 1994, proceedings, Lecture Notes in Computer Science, 839, Springer, Berlin, 1994. ISBN 3-540-58333-5. See [50].
    • (1994) Lecture Notes in Computer Science , vol.839
    • Desmedt, Y.1
  • 32
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • see also newer version [33]. MR 87b: 94037
    • ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms, in Crypto '84 [16] (1985), 10-18; see also newer version [33]. MR 87b: 94037.
    • (1985) Crypto'84 , Issue.16 , pp. 10-18
    • ElGamal, T.1
  • 33
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • see also older version [32]. ISSN 0018-9448. MR 86j: 94045. Citations in this document: §2, §2, §2, §2, §2
    • ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory 31 (1985), 469-472; see also older version [32]. ISSN 0018-9448. MR 86j: 94045. Citations in this document: §2, §2, §2, §2, §2.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 34
    • 67650659199 scopus 로고    scopus 로고
    • Endomorphisms for faster elliptic curve cryptography on a large class of curves
    • Citations in this document: §1, §1, §1
    • Galbraith, S., Lin, X., Scott, M.: Endomorphisms for faster elliptic curve cryptography on a large class of curves, in Eurocrypt 2009 [43] (2009), 518-535. URL: http://eprint. iacr. org/2008/194. Citations in this document: §1, §1, §1.
    • (2009) Eurocrypt 2009 , Issue.43 , pp. 518-535
    • Galbraith, S.1    Lin, X.2    Scott, M.3
  • 37
    • 36749054167 scopus 로고    scopus 로고
    • Efficient signature schemes with tight reductions to the Diffie-Hellman problems
    • See [47]
    • Goh, E.-J., Jarecki, S., Katz, J., Wang, N.: Efficient signature schemes with tight reductions to the Diffie-Hellman problems, Journal of Cryptology 20 (2007), 493-514. URL: http://www. cs. umd. edu/~jkatz/papers. html. See [47].
    • (2007) Journal of Cryptology , vol.20 , pp. 493-514
    • Goh, E.-J.1    Jarecki, S.2    Katz, J.3    Wang, N.4
  • 39
    • 84887212852 scopus 로고    scopus 로고
    • Arithmetic of finite fields, third international workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010, proceedings
    • (editors): Springer, ISBN 978-3-642-13796- 9. See [17]
    • Hasan, M. A., Helleseth, T. (editors): Arithmetic of finite fields, third international workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010, proceedings, Lecture Notes in Computer Science, 6087, Springer, 2010. ISBN 978-3-642-13796- 9. See [17].
    • (2010) Lecture Notes in Computer Science , vol.6087
    • Hasan, M.A.1    Helleseth, T.2
  • 40
    • 79956308175 scopus 로고    scopus 로고
    • Ph. D. thesis, Queensland University of Technology, Citations in this document: §1
    • Hisil, H.: Elliptic curves, group law, and efficient computation, Ph. D. thesis, Queensland University of Technology, 2010. URL: http://eprints. qut. edu. au/33233. Citations in this document: §1.
    • (2010) Elliptic curves, group law, and efficient computation
    • Hisil, H.1
  • 41
    • 58349103020 scopus 로고    scopus 로고
    • in Asiacrypt 2008, Citations in this document: §4, §4, §4
    • Hisil, H., Wong, K. K.-H., Carter, G., Dawson, E.: Twisted Edwards curves revisited, in Asiacrypt 2008 [64] (2008), 326-343. URL: http://eprint. iacr. org/2008/522. Citations in this document: §4, §4, §4.
    • (2008) Twisted Edwards curves revisited , Issue.64 , pp. 326-343
    • Hisil, H.1    Wong, K.K.-H.2    Carter, G.3    Dawson, E.4
  • 43
    • 84877991737 scopus 로고    scopus 로고
    • Advances in cryptology-EUROCRYPT 2009, 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26-30, 2009, proceedings
    • (editor), Springer,ISBN 978-3-642-01000-2. See [34]
    • Joux, A. (editor): Advances in cryptology-EUROCRYPT 2009, 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26-30, 2009, proceedings, Lecture Notes in Computer Science, 5479, Springer, 2009. ISBN 978-3-642-01000-2. See [34].
    • (2009) Lecture Notes in Computer Science , vol.5479
    • Joux, A.1
  • 46
    • 84887212887 scopus 로고    scopus 로고
    • 2nd Workshop on Real-Life Cryptographic Protocols and Standardization (RLCPS 2011), to appear. Citations in this document: §1, §1
    • Käsper, E.: Fast elliptic curve cryptography in OpenSSL, in 2nd Workshop on Real-Life Cryptographic Protocols and Standardization (RLCPS 2011), to appear (2011). Citations in this document: §1, §1.
    • (2011) Fast elliptic curve cryptography in OpenSSL
    • Käsper, E.1
  • 49
    • 84866701100 scopus 로고    scopus 로고
    • Advances in cryptology-ASIACRYPT 2007, 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007, proceedings
    • Springer, ISBN 978-3-540-76899-9. See [14]
    • Kurosawa, K. (editor): Advances in cryptology-ASIACRYPT 2007, 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007, proceedings, Lecture Notes in Computer Science, 4833, Springer, 2007. ISBN 978-3-540-76899-9. See [14].
    • (2007) Lecture Notes in Computer Science , vol.4833
    • Kurosawa, K.1
  • 51
    • 84905246806 scopus 로고    scopus 로고
    • accessed 11 July 2011, Citations in this document:§1, §1
    • Longa, P.: Speed benchmarks for elliptic curve scalar multiplication, accessed 11 July 2011 (2011). URL: http://www. patricklonga. bravehost. com/speed_ecc. html. Citations in this document: §1, §1.
    • (2011) Speed benchmarks for elliptic curve scalar multiplication
    • Longa, P.1
  • 53
    • 84866716623 scopus 로고    scopus 로고
    • Cryptographic hardware and embedded systems, CHES 2010, 12th international workshop, Santa Barbara, CA, USA, August 17-20, 2010, proceedings
    • (editors): Springer, ISBN 978-3-642-15030-2. See [52]
    • Mangard, S., Standaert, F.-X. (editors): Cryptographic hardware and embedded systems, CHES 2010, 12th international workshop, Santa Barbara, CA, USA, August 17-20, 2010, proceedings, Lecture Notes in Computer Science, 6225, Springer, 2010. ISBN 978-3-642-15030-2. See [52].
    • (2010) Lecture Notes in Computer Science , vol.6225
    • Mangard, S.1    Standaert, F.-X.2
  • 54
    • 80052011177 scopus 로고    scopus 로고
    • Advances in cryptology-ASIACRYPT 2009, 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6-10, 2009, proceedings
    • (editor): Springer, ISBN 978-3-642-10365-0. See [23]
    • Matsui, M. (editor): Advances in cryptology-ASIACRYPT 2009, 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6-10, 2009, proceedings, Lecture Notes in Computer Science, 5912, Springer, 2009. ISBN 978-3-642-10365-0. See [23].
    • (2009) Lecture Notes in Computer Science , vol.5912
    • Matsui, M.1
  • 55
    • 84887213004 scopus 로고    scopus 로고
    • Advances in cryptology-CRYPTO 2007, 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2007, proceedings
    • (editor): Springer, ISBN 978-3-540-74142-8. See [30]
    • Menezes, A. (editor): Advances in cryptology-CRYPTO 2007, 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2007, proceedings, Lecture Notes in Computer Science, 4622, Springer, 2007. ISBN 978-3-540-74142-8. See [30].
    • (2007) Lecture Notes in Computer Science , vol.4622
    • Menezes, A.1
  • 56
    • 84887212710 scopus 로고    scopus 로고
    • Computational alternatives to random number generators
    • Citations in this document: §2
    • M'Raïhi, D., Naccache, D., Pointcheval, D., Vaudenay, S.: Computational alternatives to random number generators, in SAC '98 [77] (1999), 72-80. URL: http://www. di. ens. fr/~pointche/Documents/Papers/1998_sac. pdf. Citations in this document: §2.
    • (1999) SAC '98 , Issue.77 , pp. 72-80
    • M'Raïhi, D.1    Naccache, D.2    Pointcheval, D.3    Vaudenay, S.4
  • 57
    • 84887213279 scopus 로고    scopus 로고
    • Topics in cryptology-CT-RSA 2001: the cryptographers' track at RSA Conference 2001, San Francisco, CA, USA, April 2001, proceedings
    • (editor): Springer,ISBN 3-540-41898-9. MR 2003a: 94039. See [22]
    • Naccache, D. (editor): Topics in cryptology-CT-RSA 2001: the cryptographers' track at RSA Conference 2001, San Francisco, CA, USA, April 2001, proceedings, Lecture Notes in Computer Science, 2020, Springer, 2001. ISBN 3-540-41898-9. MR 2003a: 94039. See [22].
    • (2001) Lecture Notes in Computer Science , vol.2020
    • Naccache, D.1
  • 59
    • 0041863206 scopus 로고
    • Can D. S. A. be improved? Complexity trade-offs with the digital signature standard
    • in Citations in this document: §5, §5, §5, §5, §5, §5, §5
    • Naccache, D., M'Raïhi, D., Vaudenay, S., Raphaeli, D.: Can D. S. A. be improved? Complexity trade-offs with the digital signature standard, in Eurocrypt'94 [28] (1994). Citations in this document: §5, §5, §5, §5, §5, §5, §5.
    • (1994) Eurocrypt'94 , Issue.28
    • Naccache, D.1    M'Raïhi, D.2    Vaudenay, S.3    Raphaeli, D.4
  • 61
    • 80053498671 scopus 로고    scopus 로고
    • Hash function requirements for Schnorr signatures
    • Citations in this document: §2, §2
    • Neven, G., Smart, N. P., Warinschi, B.: Hash function requirements for Schnorr signatures, Journal of Mathematical Cryptology 3 (2009), 69-87. URL: http://www. zurich. ibm. com/~nev/papers/schnorr. html. Citations in this document: §2, §2.
    • (2009) Journal of Mathematical Cryptology , vol.3 , pp. 69-87
    • Neven, G.1    Smart, N.P.2    Warinschi, B.3
  • 62
    • 0141889703 scopus 로고    scopus 로고
    • The insecurity of the elliptic curve digital signature algorithm with partially known nonces
    • Citations in this document: §2
    • Nguyen P. Q., Shparlinski I.:: The insecurity of the elliptic curve digital signature algorithm with partially known nonces. Designs, Codes and Cryptography 30, 201-217 (2003) Citations in this document: §2.
    • (2003) Designs, Codes and Cryptography , vol.30 , pp. 201-217
    • Nguyen, P.Q.1    Shparlinski, I.2
  • 63
    • 84871575245 scopus 로고    scopus 로고
    • Advances in cryptology-EUROCRYPT '98, international conference on the theory and application of cryptographic techniques, Espoo, Finland, May 31-June 4, 1998, proceedings
    • (editor): Springer, ISBN 3-540-64518-7. See [10]
    • Nyberg, K. (editor): Advances in cryptology-EUROCRYPT '98, international conference on the theory and application of cryptographic techniques, Espoo, Finland, May 31-June 4, 1998, proceedings, Lecture Notes in Computer Science, 1403, Springer, 1998. ISBN 3-540-64518-7. See [10].
    • (1998) Lecture Notes in Computer Science , vol.1403
    • Nyberg, K.1
  • 64
    • 84871575376 scopus 로고    scopus 로고
    • Advances in cryptology-ASIACRYPT 2008, 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7-11, 2008
    • (editor): ISBN 978-3-540-89254-0. See [41]
    • Pieprzyk, J. (editor): Advances in cryptology-ASIACRYPT 2008, 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7-11, 2008, Lecture Notes in Computer Science, 5350, 2008. ISBN 978-3-540-89254-0. See [41].
    • (2008) Lecture Notes in Computer Science , vol.5350
    • Pieprzyk, J.1
  • 65
    • 84881241732 scopus 로고
    • On the evaluation of powers and related problems (preliminary version)
    • newer version split into [66] and [67]. MR 58: 3682,Citations in this document: §4, §5
    • Pippenger, N.: On the evaluation of powers and related problems (preliminary version), in FOCS '76 [1] (1976), 258-263; newer version split into [66] and [67]. MR 58: 3682. URL: http://cr. yp. to/bib/entries. html#1976/pippenger. Citations in this document: §4, §5.
    • (1976) FOCS'76 , Issue.1 , pp. 258-263
    • Pippenger, N.1
  • 67
    • 0347853530 scopus 로고
    • On the evaluation of powers and monomials
    • see also older version [65]. ISSN 0097-5397. MR 82c: 10064
    • Pippenger, N.: On the evaluation of powers and monomials, SIAM Journal on Computing 9 (1980), 230-250; see also older version [65]. ISSN 0097-5397. MR 82c: 10064. URL: http://cr. yp. to/bib/entries. html#1976/pippenger.
    • (1980) SIAM Journal on Computing , vol.9 , pp. 230-250
    • Pippenger, N.1
  • 69
    • 84866679383 scopus 로고    scopus 로고
    • Progress in cryptology-AFRICACRYPT 2009, second international conference on cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009, proceedings
    • (editor): Springer,See [26]
    • Preneel, B. (editor): Progress in cryptology-AFRICACRYPT 2009, second international conference on cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009, proceedings, Lecture Notes in Computer Science, 5580, Springer, 2009. See [26].
    • (2009) Lecture Notes in Computer Science , vol.5580
    • Preneel, B.1
  • 70
    • 84887213980 scopus 로고    scopus 로고
    • Selected areas in cryptography, 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, revised selected papers
    • (editors): Springer,ISBN 3-540-33108-5. MR 2007b: 94002. See [7]
    • Preneel, B., Tavares, S. E. (editors): Selected areas in cryptography, 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, revised selected papers, Lecture Notes in Computer Science, 3897, Springer, 2006. ISBN 3-540-33108-5. MR 2007b: 94002. See [7].
    • (2006) Lecture Notes in Computer Science , vol.3897
    • Preneel, B.1    Tavares, S.E.2
  • 72
    • 84871543949 scopus 로고
    • Advances in cryptology-EUROCRYPT '92, workshop on the theory and application of cryptographic techniques, Balatonfüred, Hungary, May 24-28, 1992, proceedings
    • (editor): Springer, Berlin, ISBN 3-540-56413-6. MR 94e: 94002. See [19]
    • Rueppel, R. A. (editor): Advances in cryptology-EUROCRYPT '92, workshop on the theory and application of cryptographic techniques, Balatonfüred, Hungary, May 24-28, 1992, proceedings, Lecture Notes in Computer Science, 658, Springer, Berlin, 1993. ISBN 3-540-56413-6. MR 94e: 94002. See [19].
    • (1993) Lecture Notes in Computer Science , vol.658
    • Rueppel, R.A.1
  • 73
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • see also newer version [74]. Citations in this document: §2, §2, §2
    • Schnorr, C. P.: Efficient identification and signatures for smart cards, in Crypto '89 [18] (1990), 239-252; see also newer version [74]. Citations in this document: §2, §2, §2.
    • (1990) Crypto'89 , Issue.18 , pp. 239-252
    • Schnorr, C.P.1
  • 77
    • 84887212926 scopus 로고    scopus 로고
    • Selected areas in cryptography, 5th annual international workshop, SAC98, Kingston, Ontario, Canada, August 17-18, 1998, proceedings
    • (editors): Springer,ISBN 3-540-65894-7. See [56]
    • Tavares, S., Meijer, H. (editors): Selected areas in cryptography, 5th annual international workshop, SAC98, Kingston, Ontario, Canada, August 17-18, 1998, proceedings, Lecture Notes in Computer Science, 1556, Springer, 1999. ISBN 3-540-65894-7. See [56].
    • (1999) Lecture Notes in Computer Science , vol.1556
    • Tavares, S.1    Meijer, H.2
  • 78
    • 84887212861 scopus 로고    scopus 로고
    • Progress in cryptology-AFRICACRYPT 2008, First international conference on cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, proceedings
    • (editor): Springer, ISBN 978-3-540-68159-5. See [13]
    • Vaudenay, S. (editor): Progress in cryptology-AFRICACRYPT 2008, First international conference on cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, proceedings, Lecture Notes in Computer Science, 5023, Springer, 2008. ISBN 978-3-540-68159-5. See [13].
    • (2008) Lecture Notes in Computer Science , vol.5023
    • Vaudenay, S.1
  • 81
    • 0000966673 scopus 로고    scopus 로고
    • Advances in cryptology-CRYPTO 2002, 22nd annual international cryptology conference, Santa Barbara, California, USA, August 18-22, 2002, proceedings
    • (editor): Springer,ISBN 3-540-44050-X. See [76]
    • Yung, M. (editor): Advances in cryptology-CRYPTO 2002, 22nd annual international cryptology conference, Santa Barbara, California, USA, August 18-22, 2002, proceedings, Lecture Notes in Computer Science, 2442, Springer, 2002. ISBN 3-540-44050-X. See [76].
    • (2002) Lecture Notes in Computer Science , vol.2442
    • Yung, M.1
  • 82
    • 84866719909 scopus 로고    scopus 로고
    • Public key cryptography-9th international conference on theory and practice in public-key cryptography, New York, NY, USA, April 24-26, 2006, proceedings
    • (editors): Springer, ISBN 978-3-540-33851-2. See [12]
    • Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (editors): Public key cryptography-9th international conference on theory and practice in public-key cryptography, New York, NY, USA, April 24-26, 2006, proceedings, Lecture Notes in Computer Science, 3958, Springer, 2006. ISBN 978-3-540-33851-2. See [12].
    • (2006) Lecture Notes in Computer Science , vol.3958
    • Yung, M.1    Dodis, Y.2    Kiayias, A.3    Malkin, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.