-
1
-
-
18744401716
-
-
Cryptology ePrint Archive Report 2000/002 at, (full version of this paper). Also available from authors’ websites
-
M. Abdalla and L. Reyzin, “A New Forward-Secure Digital Signature Scheme,” Cryptology ePrint Archive Report 2000/002 at http://eprint.iacr.org/(full version of this paper). Also available from authors’ websites.
-
A New Forward-Secure Digital Signature Scheme
-
-
Abdalla, M.1
Reyzin, L.2
-
3
-
-
79958074367
-
A forward-secure digital signature scheme
-
M. Wiener ed., Springer-Verlag
-
M. Bellare and S. Miner, “A forward-secure digital signature scheme,” Advances in Cryptology –Crypto 99 Proceedings, Lecture Notes in Computer Science Vol. 1666, M. Wiener ed., Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology –Crypto 99 Proceedings, Lecture Notes in Computer Science
, vol.1666
-
-
Bellare, M.1
Miner, S.2
-
5
-
-
84947906522
-
The exact security of digital signatures: How to sign with RSA and Rabin
-
U. Maurer ed., Springer-Verlag
-
M. Bellare and P. Rogaway, “The exact security of digital signatures: How to sign with RSA and Rabin,” Advances in Cryptology –Eurocrypt 96 Proceedings, Lecture Notes in Computer Science Vol. 1070, U. Maurer ed., Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology –Eurocrypt 96 Proceedings, Lecture Notes in Computer Science
, vol.1070
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84921068967
-
Secure signature schemes based on interactive protocols
-
D. Coppersmith ed., Springer-Verlag
-
R. Cramer and I. Damgård, “Secure signature schemes based on interactive protocols,” Advances in Cryptology –Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology –Crypto 95 Proceedings, Lecture Notes in Computer Science
, vol.963
-
-
Cramer, R.1
Damgård, I.2
-
8
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. van Oorschot, and M. Wiener, “Authentication and authenticated key exchanges,” Designs, Codes and Cryptography, 2, 1992, pp. 107–125.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
9
-
-
0003157491
-
On-line/Off-line digital signatures
-
S. Even, O. Goldreich, and S. Micali, “On-line/Off-line digital signatures,” Jounal of Cryptology, Vol. 9, 1996, pp. 35–67.
-
(1996)
Jounal of Cryptology
, vol.9
, pp. 35-67
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
10
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. Odlyzko ed., Springer-Verlag
-
A. Fiat and A. Shamir, “How to prove yourself: Practical solutions to identification and signature problems,” Advances in Cryptology –Crypto 86 Proceedings, Lecture Notes in Computer Science Vol. 263, A. Odlyzko ed., Springer-Verlag, 1986.
-
(1986)
Advances in Cryptology –Crypto 86 Proceedings, Lecture Notes in Computer Science
, vol.263
-
-
Fiat, A.1
Shamir, A.2
-
11
-
-
84937505868
-
Two remarks concerning the GMR signature scheme
-
A. Odlyzko ed., Springer-Verlag
-
O. Goldreich, “Two remarks concerning the GMR signature scheme,” Advances in Cryptology –Crypto 86 Proceedings, Lecture Notes in Computer Science Vol. 263, A. Odlyzko ed., Springer-Verlag, 1986.
-
(1986)
Advances in Cryptology –Crypto 86 Proceedings, Lecture Notes in Computer Science
, vol.263
-
-
Goldreich, O.1
-
12
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali and R. Rivest, “A digital signature scheme secure against adaptive chosen-message attacks,” SIAM Journal of Computing, Vol. 17, No. 2, pp. 281–308, April 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
13
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
C. Gunther ed., Springer-Verlag
-
L. Guillou and J. Quisquater, “A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory,” Advances in Cryptology –Eurocrypt 88 Proceedings, Lecture Notes in Computer Science Vol. 330, C. Gunther ed., Springer-Verlag, 1988.
-
(1988)
Advances in Cryptology –Eurocrypt 88 Proceedings, Lecture Notes in Computer Science
, vol.330
-
-
Guillou, L.1
Quisquater, J.2
-
14
-
-
84969368443
-
An identity-based key-exchange protocol
-
J-J. Quisquater, J. Vandewille ed., Springer-Verlag
-
C. Günther, “An identity-based key-exchange protocol,” Advances in Cryptology –Eurocrypt 89 Proceedings, Lecture Notes in Computer Science Vol. 434, J-J. Quisquater, J. Vandewille ed., Springer-Verlag, 1989.
-
(1989)
Advances in Cryptology –Eurocrypt 89 Proceedings, Lecture Notes in Computer Science
, vol.434
-
-
Günther, C.1
-
15
-
-
84955368946
-
More Flexible Exponentiation with Precomputation
-
Y. Desmedt ed., Springer-Verlag
-
C. H. Lim and P J. Lee, “More Flexible Exponentiation with Precomputation,” Advances in Cryptology –Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994
-
(1994)
Advances in Cryptology –Crypto 94 Proceedings, Lecture Notes in Computer Science
, vol.839
-
-
Lim, C.H.1
Lee, P.J.2
-
16
-
-
0004743525
-
Fast signature generation with a Fiat-Shamir like scheme
-
I. Damgård ed., Springer-Verlag
-
H. Ong and C. Schnorr, “Fast signature generation with a Fiat-Shamir like scheme,” Advances in Cryptology –Eurocrypt 90 Proceedings, Lecture Notes in Computer Science Vol. 473, I. Damgård ed., Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology –Eurocrypt 90 Proceedings, Lecture Notes in Computer Science
, vol.473
-
-
Ong, H.1
Schnorr, C.2
-
17
-
-
33746441852
-
-
Technical Report MIT/LCS/TM-501, Massachusetts Institute of Technology, Cambridge, MA, March
-
S. Micali, “A secure and efficient digital signature algorithm,” Technical Report MIT/LCS/TM-501, Massachusetts Institute of Technology, Cambridge, MA, March 1994.
-
(1994)
“A Secure and Efficient Digital Signature Algorithm
-
-
Micali, S.1
-
18
-
-
84961294848
-
Improving the exact security of Fiat-Shamir signature schemes
-
R. Baumgart, editor, Springer- Verlag
-
S. Micali and L. Reyzin, “Improving the exact security of Fiat-Shamir signature schemes.” In R. Baumgart, editor, Secure Networking — CQRE [Secure] ’99, volume 1740 of Lecture Notes in Computer Science, pages 167–182, Springer- Verlag, 1999.
-
(1999)
Secure Networking — CQRE [Secure] ’99, Volume 1740 of Lecture Notes in Computer Science
, pp. 167-182
-
-
Micali, S.1
Reyzin, L.2
-
19
-
-
85031804925
-
A Modification of the Fiat-Shamir Scheme
-
S. Goldwasser ed., Springer-Verlag
-
K. Ohta and T. Okamoto. “A Modification of the Fiat-Shamir Scheme,” Advances in Cryptology –Crypto 88 Proceedings, Lecture Notes in Computer Science Vol. 403, S. Goldwasser ed., Springer-Verlag, 1988, pp. 232-243.
-
(1988)
Advances in Cryptology –Crypto 88 Proceedings, Lecture Notes in Computer Science
, vol.403
, pp. 232-243
-
-
Ohta, K.1
Okamoto, T.2
-
20
-
-
84927727752
-
Security proofs for signature schemes
-
U. Maurer ed., Springer-Verlag
-
D. Pointcheval and J. Stern, “Security proofs for signature schemes,” Advances in Cryptology –Eurocrypt 96 Proceedings, Lecture Notes in Computer Science Vol. 1070, U. Maurer ed., Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology –Eurocrypt 96 Proceedings, Lecture Notes in Computer Science
, vol.1070
-
-
Pointcheval, D.1
Stern, J.2
|