-
1
-
-
84957668600
-
Quantum cryptanalysis of hidden linear functions
-
Springer-Verlag
-
D. Boneh and R. J. Lipton, “Quantum cryptanalysis of hidden linear functions,” Proc. of CRYPTO’95, LNCS 963, Springer-Verlag, pp.424-437, 1995.
-
(1995)
Proc. Of CRYPTO’95, LNCS 963
, pp. 424-437
-
-
Boneh, D.1
Lipton, R.J.2
-
2
-
-
85017093546
-
Authentication codes with multiple arbiters
-
Springer-Verlag
-
E. F. Brickell and D. R. Stinson, “Authentication codes with multiple arbiters,” Proc. of Eurocrypt’88, LNCS 330, Springer-Verlag, pp.51-55, 1988.
-
(1988)
Proc. Of Eurocrypt’88, LNCS 330
, pp. 51-55
-
-
Brickell, E.F.1
Stinson, D.R.2
-
3
-
-
77956089601
-
Factorization of a 512-bit RSA modulus
-
Springer-Verlag
-
S. Cavallar, B. Dodson, A. K. Lenstra, et al., “Factorization of a 512-bit RSA modulus,” Proc. of Eurocrypt’00, LNCS 1807, Springer-Verlag, pp.1-18, 2000.
-
(2000)
Proc. Of Eurocrypt’00, LNCS 1807
, pp. 1-18
-
-
Cavallar, S.1
Dodson, B.2
Lenstra, A.K.3
-
4
-
-
84988897099
-
Unconditionally secure digital signatures
-
Springer-Verlag
-
D. Chaum and S. Roijakkers, “Unconditionally secure digital signatures,” Proc. of CRYPTO’90, LNCS 537, Springer-Verlag, pp.206-215, 1990.
-
(1990)
Proc. Of CRYPTO’90, LNCS 537
, pp. 206-215
-
-
Chaum, D.1
Roijakkers, S.2
-
5
-
-
84947955350
-
Cryptographically strong undeniable signatures, unconditionally secure for the signer
-
Springer-Verlag
-
D. Chaum, E. Heijst and B. Pfitzmann, “Cryptographically strong undeniable signatures, unconditionally secure for the signer,” Proc. of CRYPTO’91, LNCS 576, Springer-Verlag, pp.470-484, 1991.
-
(1991)
Proc. Of CRYPTO’91, LNCS 576
, pp. 470-484
-
-
Chaum, D.1
Heijst, E.2
Pfitzmann, B.3
-
6
-
-
84958957924
-
RIPEMD160: Strengthened version of RIPEMD
-
Springer-Verlag
-
H. Dobbertin, A. Bosselaers and B. Preneel, “RIPEMD160: strengthened version of RIPEMD,” Proc. of FSE’96, LNCS 1039, Springer-Verlag, pp.71-82, 1996.
-
(1996)
Proc. Of FSE’96, LNCS 1039
, pp. 71-82
-
-
Dobbertin, H.1
Bosselaers, A.2
Preneel, B.3
-
7
-
-
85027188625
-
Arbitrated unconditionally secure authentication can be unconditionally protected against arbiters attack,”
-
Springer-Verlag
-
Y. Desmedt and M. Yung, “Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter’s attack,” Proc. of CRYPTO’90, LNCS 537, Springer-Verlag, pp.177-188, 1990.
-
(1990)
Proc. Of CRYPTO’90, LNCS 537
, pp. 177-188
-
-
Desmedt, Y.1
Yung, M.2
-
8
-
-
0026992399
-
“Multi-receiver/Multi-sender network security: Efficient authenticated multicast/feedback
-
Federal Register
-
Y. Desmedt, Y. Frankel and M. Yung, “Multi-receiver/Multi-sender network security: efficient authenticated multicast/feedback,” Proc. of IEEE Infocom’92, pp.2045-2054, 1992. 9.
-
(1992)
Proc. Of IEEE Infocom
, vol.92
, pp. 2045-2054
-
-
Desmedt, Y.1
Frankel, Y.2
Yung, M.3
-
9
-
-
0000758345
-
-
Federal Register, 30
-
“Proposed federal information processing standard for digital signature standard (DSS),” Federal Register, vol. 56, no. 169, 30, pp.42980-42982, 1991.
-
(1991)
Proposed federal information processing standard for digital signature standard (DSS)
, vol.56
, Issue.169
, pp. 42980-42982
-
-
-
10
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. on Inform. Theory, IT-31, 4, pp.469-472, 1985.
-
(1985)
IEEE Trans. On Inform. Theory, IT-31
, vol.4
, pp. 469-472
-
-
Elgamal, T.1
-
11
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Springer-Verlag
-
A. Fiat and A. Shamir, “How to prove yourself: practical solutions to identification and signature problems,” Proc. of CRYPTO’86, LNCS 263, Springer-Verlag, pp.186-194, 1986.
-
(1986)
Proc. Of CRYPTO’86, LNCS 263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
12
-
-
0016038540
-
Codes which detect deception
-
E. N. Gilbert, F. J. MacWilliams and N. J. A. Sloane, “Codes which detect deception,” Bell System Technical Journal, 53, pp.405-425, 1974.
-
(1974)
Bell System Technical Journal
, vol.53
, pp. 405-425
-
-
Gilbert, E.N.1
Macwilliams, F.J.2
Sloane, N.J.3
-
13
-
-
0028514178
-
Lower bounds on the probability of deception in authentication with arbitration
-
T. Johansson, “Lower bounds on the probability of deception in authentication with arbitration”, IEEE Trans. Inform. Theory, IT-40, 5, pp.1573-1585, 1994.
-
(1994)
IEEE Trans. Inform. Theory, IT-40
, vol.5
, pp. 1573-1585
-
-
Johansson, T.1
-
14
-
-
0001925043
-
Further results on asymmetric authentication schemes
-
T. Johansson, “Further results on asymmetric authentication schemes,” Information and Computation, 151, pp.100-133, 1999.
-
(1999)
Information and Computation
, vol.151
, pp. 100-133
-
-
Johansson, T.1
-
15
-
-
0347188281
-
New bound on authentication code with arbitration
-
Springer-Verlag
-
K. Kurosawa, “New bound on authentication code with arbitration,” Proc. of CRYPTO’94, LNCS 839, Springer-Verlag, pp.140-149, 1994.
-
(1994)
Proc. Of CRYPTO’94, LNCS 839
, pp. 140-149
-
-
Kurosawa, K.1
-
16
-
-
84957375261
-
Combinatorial bounds for authentication codes with arbitration
-
Springer-Verlag
-
K. Kurosawa and S. Obana, “Combinatorial bounds for authentication codes with arbitration,” Proc. of Eurocrypt’95, LNCS 921, Springer-Verlag, pp.289-300, 1995.
-
(1995)
Proc. Of Eurocrypt’95, LNCS 921
, pp. 289-300
-
-
Kurosawa, K.1
Obana, S.2
-
17
-
-
84937446460
-
-
“Secure hash standard,” FIPS PUB 180-1, Department of Commerce, Washington D.C
-
NIST, “Secure hash standard,” FIPS PUB 180-1, Department of Commerce, Washington D.C., 1995.
-
(1995)
-
-
-
18
-
-
0842327113
-
A2-code = affine resolvable + BIBD
-
Springer-Verlag
-
S. Obana and K. Kurosawa, “A2-code = affine resolvable + BIBD,” Proc. of ICICS’97, LNCS 1334, Springer-Verlag, pp.118-129, 1997.
-
(1997)
Proc. Of ICICS’97, LNCS 1334
, pp. 118-129
-
-
Obana, S.1
Kurosawa, K.2
-
19
-
-
0025207738
-
A fast signature scheme based on congruential polynomial operations
-
T. Okamoto, “A fast signature scheme based on congruential polynomial operations,” IEEE Trans. on Inform. Theory, IT-36, 1, pp.47-53, 1990.
-
(1990)
IEEE Trans. On Inform. Theory, IT-36
, vol.1
, pp. 47-53
-
-
Okamoto, T.1
-
20
-
-
0017930809
-
A method for obtaining digital signature and public-key cryptosystems
-
R. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signature and public-key cryptosystems,” Communication of the ACM, vol.21, no.2, pp.120-126, 1978.
-
(1978)
Communication of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
22
-
-
0012048998
-
Broadcast authentication in group communication
-
Springer-Verlag
-
R. Safavi-Naini and H. Wang, “Broadcast authentication in group communication,” Proc. of Asiacrypt’99, LNCS1716, Springer-Verlag, pp.399-411, 1999.
-
(1999)
Proc. Of Asiacrypt’99, LNCS1716
, pp. 399-411
-
-
Safavi-Naini, R.1
Wang, H.2
-
23
-
-
0001531989
-
Multireceiver authentication codes: Models, bounds, constructions and extensions
-
R. Safavi-Naini and H. Wang, “Multireceiver authentication codes: models, bounds, constructions and extensions,” Information and Computation, 151, pp.148-172, 1999.
-
(1999)
Information and Computation
, vol.151
, pp. 148-172
-
-
Safavi-Naini, R.1
Wang, H.2
-
24
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. Schnorr, “Efficient signature generation by smart cards,” Journal of Cryptology, 4, pp.161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.1
-
25
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAMJ. Comp., 26, no.5, pp.1484-1509, 1997.
-
(1997)
SIAMJ. Comp.
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
26
-
-
84983269168
-
Authentication theory/coding theory
-
Springer-Verlag
-
G. J. Simmons, “Authentication theory/coding theory,” Proc. of CRYPTO’84, LNCS 196, Springer-Verlag, pp.411-431, 1984.
-
(1984)
Proc. Of CRYPTO’84, LNCS 196
, pp. 411-431
-
-
Simmons, G.J.1
-
27
-
-
84920719029
-
Message authentication with arbitration of transmitter/receiver disputes
-
Springer-Verlag
-
G. J. Simmons, “Message authentication with arbitration of transmitter/receiver disputes,” Proc. of Eurocyrpt’87, Springer-Verlag, pp.151-165, 1987.
-
(1987)
Proc. Of Eurocyrpt’87
, pp. 151-165
-
-
Simmons, G.J.1
-
28
-
-
0025157340
-
A Cartesian construction for unconditionally secure authentication codes that permit arbitration
-
G. J. Simmons, “A Cartesian construction for unconditionally secure authentication codes that permit arbitration,” Journal of Cryptology, 2, pp.77-104, 1990.
-
(1990)
Journal of Cryptology
, vol.2
, pp. 77-104
-
-
Simmons, G.J.1
-
29
-
-
84942520493
-
“Near optimal unconditionally secure authentication
-
Springer-Verlag
-
R. Taylor, “Near optimal unconditionally secure authentication,” Proc. of Eurocyrpt’ 94, LNCS 950, Springer-Verlag, pp.244-253, 1994.
-
(1994)
Proc. Of Eurocyrpt’ 94, LNCS 950
, pp. 244-253
-
-
Taylor, R.1
-
30
-
-
0842305614
-
A3-codes under collusion attacks, Proc. Of Asiacrypt
-
Springer-Verlag
-
Y. Wang and R. Safavi-Naini, “A3-codes under collusion attacks,” Proc. of Asiacrypt’ 99, LNCS 1716, Springer-Verlag, pp.390-398, 1999.
-
(1999)
99, LNCS 1716
, pp. 390-398
-
-
Wang, Y.1
Safavi-Naini, R.2
-
31
-
-
84985796228
-
HAVAL - A one-way hashing algorithm with variable length of output
-
Springer-Verlag
-
Y. Zheng, J. Pieprzyk and J. Seberry, “HAVAL - A one-way hashing algorithm with variable length of output,” Proc. of Auscrypt’92, LNCS 718, Springer-Verlag, pp.83-104, 1993.
-
(1993)
Proc. Of Auscrypt’92, LNCS 718
, pp. 83-104
-
-
Zheng, Y.1
Pieprzyk, J.2
Seberry, J.3
|