-
3
-
-
84990731886
-
How to Prove Yourself: Practical solutions of identification and signature problems
-
In A. M. Odlyzko, editor, Springer-Verlag,
-
A. Fiat and A. Shamir. How to Prove Yourself: practical solutions of identification and signature problems. In A. M. Odlyzko, editor,Advances in Cryptology - Proceedings of CRYPTO'86, volume 263 of Lecture Notes in Computer Science, pages 186-194. Springer-Verlag, 1987.
-
(1987)
Advances in Cryptology - Proceedings of CRYPTO'86, volume 263 of Lecture Notes in Computer Science
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
4
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
july
-
T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. InIEEE Transactions on Information Theory, volume IT- 31, no. 4, pages 469-472, july 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT- 31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
6
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adapt. ative Chosen-Message Attacks
-
april
-
S. Goldwasser, S. Micali, and R. Rivest. A Digital Signature Scheme Secure Against Adapt.ative Chosen-Message Attacks.SIAM journal of computing, 17(2):281 -308, april 1988.
-
(1988)
SIAM journal of computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
7
-
-
84959165880
-
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory
-
In C. G. Günter, editor. Springer-Verlag,
-
L.C. Guillou and J.-J. Quisquater. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. In C. G. Günter, editor,Advances in Cryptology-Proceedings of EUROCRYPT'88, volume 330 ofLecture Notes in Computer Science, pages 123-128. Springer-Verlag, 1988.
-
(1988)
Advances in Cryptology-Proceedings of EUROCRYPT'88, volume 330 ofLecture Notes in Computer Science
, pp. 123-128
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
8
-
-
84883277124
-
-
Federal Information Processing Standards PUBlication 180 1, April
-
NIST. Secure Hash Standard (SHS). Federal Information Processing Standards PUBlication 180 1, April 1995.
-
(1995)
Secure Hash Standard (SHS)
-
-
NIST1
-
9
-
-
84957375922
-
A New Identification Scheme Baaed on The Perceptrons Problem
-
In L.C. Guillou and J. J. Quisquater, editors. Springer-Verlag,
-
D. Pointcheval. A New Identification Scheme Baaed on The Perceptrons Problem. In L.C. Guillou and J. J. Quisquater, editors,Advances in Cryptology - Proceedings of EUROCRYPT'95, volume 921 ofLecture Notes in Computer Science, pages 319-328. Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology - Proceedings of EUROCRYPT'95, volume 921 ofLecture Notes in Computer Science
, pp. 319-328
-
-
Pointcheval, D.1
-
11
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
-
february
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems.Communications of the ACM, 21(2):120-126, february 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
12
-
-
0000537828
-
Efficient Identification and Signatures for Smart Cards
-
In G. Brassard, editor, volume 435 of Lecture Notes in Computer Science, Springer-Verlag,
-
C.P. Schnorr. Efficient Identification and Signatures for Smart Cards. In G. Brassard, editor,Advances in Cryptology-Proceedings of CRYPTO'89, volume 435 of Lecture Notes in Computer Science, pages 235-251. Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology-Proceedings of CRYPTO'89
, pp. 235-251
-
-
Schnorr, C.P.1
-
13
-
-
85032871579
-
An Efficient Identification Scheme Based on Permuted Kernels
-
In G. Brassard, editor, volume 435 ofLecture Notes in Computer Science,. Springer-Verlag,
-
A. Shamir. An Efficient Identification Scheme Based on Permuted Kernels. In G. Brassard, editor,Advances in Cryptology-Proceedings of CRYPTO'89, volume 435 ofLecture Notes in Computer Science, pages 606-609. Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology-Proceedings of CRYPTO'89
, pp. 606-609
-
-
Shamir, A.1
-
14
-
-
84955595109
-
A New Identification Scheme Based on Syndrome Decoding
-
In D. R. Stinson, editor. Springer-Verlag,
-
J. Stern. A New Identification Scheme Based on Syndrome Decoding. In D. R. Stinson, editor,Advances in Cryptology-proceedings of CRYPTO'93, volume 773 ofLecture Notes in Computer Science, pages 13-21. Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology-proceedings of CRYPTO'93, volume 773 ofLecture Notes in Computer Science
, pp. 13-21
-
-
Stern, J.1
-
15
-
-
84995926594
-
Designing Identification Schemes with Keys of Short Size
-
In Y. G. Desmedt, editor. Springer-Verlag,
-
J. Stern. Designing Identification Schemes with Keys of Short Size. In Y. G. Desmedt, editor,Advances in Cryptology-proceedings of CRYPTO'94, volume 839 ofLecture Notes in Computer Science, pages 164-173. Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology-proceedings of CRYPTO'94, volume 839 ofLecture Notes in Computer Science
, pp. 164-173
-
-
Stern, J.1
|