메뉴 건너뛰기




Volumn 1976, Issue , 2000, Pages 73-89

Security of signed ElGamal encryption

Author keywords

[No Author keywords available]

Indexed keywords

HASH FUNCTIONS;

EID: 84937417404     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44448-3_7     Document Type: Conference Paper
Times cited : (96)

References (27)
  • 2
    • 84957629783 scopus 로고    scopus 로고
    • Plaintext Awareness, Non-Malleability, and Chosen Ciphertext Security: Implications and Separations
    • M. Bellare, A. Desai, D. Pointcheval and P. Rogaway: Plaintext Awareness, Non-Malleability, and Chosen Ciphertext Security: Implications and Separations. Crypto’98, LNCS 1462, pp. 26–45, 1998.
    • (1998) Crypto’98, LNCS 1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 3
    • 84955604812 scopus 로고    scopus 로고
    • Algorithms for black-box fields and their application in cryptography
    • D. Boneh and R.J. Lipton: Algorithms for black-box fields and their application in cryptography. Crypto’96, LNCS 1109, pp. 283–297, 1996.
    • (1996) Crypto’96, LNCS 1109 , pp. 283-297
    • Boneh, D.1    Lipton, R.J.2
  • 7
    • 84870707379 scopus 로고    scopus 로고
    • A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
    • R. Cramer and V. Shoup: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. Crypto’98, LNCS 1462, pp. 13–25, 1998.
    • (1998) Crypto’98, LNCS 1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 8
    • 85028450627 scopus 로고
    • Non-Malleable Cryptography
    • ACM Press
    • D. Dolev, C. Dwork and M. Naor: Non-Malleable Cryptography. STOC’91, ACM Press pp. 542–552, 1991.
    • (1991) STOC’91 , pp. 542-552
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 10
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • T. ElGamal: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans. Inform. Theory, 31, pp. 469–472, 1985.
    • (1985) IEEE Trans. Inform. Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 11
    • 84955339164 scopus 로고    scopus 로고
    • Secure Integration of Asymmetric and Symmetric Encryption Schemes
    • E. Fujisaki and T. Okamoto: Secure Integration of Asymmetric and Symmetric Encryption Schemes. Crypto’99, LNCS 1666, pp. 537–554, 1999.
    • (1999) Crypto’99, LNCS 1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 13
    • 84990731886 scopus 로고
    • How to Prove Yourself: Practical Solutions of Identification and Signature Problems
    • A. Fiat and A. Shamir: How to Prove Yourself: Practical Solutions of Identification and Signature Problems. Proc. Crypto’86, LNCS 263, pp. 186–194, 1987.
    • (1987) Proc. Crypto’86, LNCS 263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 17
    • 0010227312 scopus 로고
    • Complexity of a Determinate Algorithm for the Discrete Logarithm
    • V.I. Nechaev: Complexity of a Determinate Algorithm for the Discrete Logarithm. Mathematical Notes 55, pp. 165-172, 1994.
    • (1994) Mathematical Notes , vol.55 , pp. 165-172
    • Nechaev, V.I.1
  • 18
    • 84974554584 scopus 로고
    • Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
    • C. Rackoff and D.R. Simon: Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. Crypto’91, LNCS 576, pp. 433–444, 1992.
    • (1992) Crypto’91, LNCS 576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 19
    • 84976779342 scopus 로고
    • Fast probabilistic algorithms for verification of polynomial identities
    • J. Schwartz: Fast probabilistic algorithms for verification of polynomial identities. J. ACM, 27(4), pp. 701–717, 1980.
    • (1980) J. ACM , vol.27 , Issue.4 , pp. 701-717
    • Schwartz, J.1
  • 20
    • 12344258539 scopus 로고
    • Efficient Signature Generation for Smart Cards
    • C.P. Schnorr: Efficient Signature Generation for Smart Cards. Journal of Cryptology 4 (1991), pp. 161–174.
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.P.1
  • 23
    • 84942550160 scopus 로고    scopus 로고
    • Lower Bounds for Discrete Logarithms and Related Problems
    • V. Shoup: Lower Bounds for Discrete Logarithms and Related Problems. Eurocrypt’97, LNCS 1233, pp. 256-266, 1997.
    • (1997) Eurocrypt’97, LNCS 1233 , pp. 256-266
    • Shoup, V.1
  • 24
    • 84948976239 scopus 로고    scopus 로고
    • Using Hash Functions as a Hedge against Chosen Ciphertext Attack
    • V. Shoup: Using Hash Functions as a Hedge against Chosen Ciphertext Attack. Eurocrypt’2000, LNCS 1807, pp. 275–288, 2000.
    • (2000) Eurocrypt’2000, LNCS 1807 , pp. 275-288
    • Shoup, V.1
  • 25
    • 84888872516 scopus 로고    scopus 로고
    • Securing Threshold Cryptosystems against Chosen Ciphertext Attacks
    • V. Shoup and R. Gennaro: Securing Threshold Cryptosystems against Chosen Ciphertext Attacks. Eurocrypt’98, LNCS 1404, pp. 1–16, 1998.
    • (1998) Eurocrypt’98, LNCS 1404 , pp. 1-16
    • Shoup, V.1    Gennaro, R.2
  • 26
    • 84958979582 scopus 로고    scopus 로고
    • On the Security of ElGamal Based Encryption
    • Y. Tsiounis and M. Yung, On the Security of ElGamal Based Encryption. PKS’98, LNCS 1431, pp. 117-134, 1998.
    • (1998) PKS’98, LNCS 1431 , pp. 117-134
    • Tsiounis, Y.1    Yung, M.2
  • 27
    • 85028933312 scopus 로고
    • Practical Approaches to Attaining Security against Adaptively Chosen Ciphertext Attacks
    • Y. Zheng and J. Seberry, Practical Approaches to Attaining Security against Adaptively Chosen Ciphertext Attacks. Crypto’92, LNCS 740, pp. 292-304, 1992.
    • (1992) Crypto’92, LNCS 740 , pp. 292-304
    • Zheng, Y.1    Seberry, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.