-
1
-
-
84947237328
-
On the security of joint signature and encryption
-
Advances in Cryptology-Eurocrypt'02 Springer
-
J.H. An, Y. Dodis, T. Rabin, On the security of joint signature and encryption, Advances in Cryptology-Eurocrypt'02, LNCS 2332, Springer, pp. 83-107, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
2
-
-
84958982846
-
Formal proofs for the security of signcryption
-
Proc. of PKC'02 Springer
-
J. Baek, R. Steinfeld, Y. Zheng, Formal Proofs for the Security of Signcryption, Proc. of PKC'02, LNCS 2274, Springer, pp. 81-98.
-
LNCS
, vol.2274
, pp. 81-98
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
3
-
-
84958948780
-
A signcryption scheme with signature directly verifiable by public key
-
Proc. of PKC'98 Springer
-
F. Bao, R.H. Deng, A signcryption scheme with signature directly verifiable by public key, Proc. of PKC'98, LNCS 1431, Springer, pp. 55-59, 1998.
-
(1998)
LNCS
, vol.1431
, pp. 55-59
-
-
Bao, F.1
Deng, R.H.2
-
5
-
-
84874324906
-
Identity based encryption from the weil pairing
-
Advances in Cryptology-Crypto'Ol Springer
-
D. Boneh, M. Franklin, Identity Based Encryption From the Weil Pairing, Advances in Cryptology-Crypto'Ol, LNCS 2139, Springer, 2001.
-
(2001)
LNCS
, vol.2139
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
1642409507
-
An identity-based signature from gap difie-hellman groups to appear
-
proceedings of PKC Springer-Verlag
-
J.C. Cha, J.H. Cheon, An Identity-Based Signature from Gap Difie-Hellman Groups, to appear in proceedings of PKC 2003. Springer Verlag, Lecture Notes in Computer Science series.
-
(2003)
Lecture Notes in Computer Science
-
-
Cha, J.C.1
Cheon, J.H.2
-
7
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Proc. of Cryptography and Coding Springer
-
C. Cocks, An Identity Based Encryption Scheme Based on Quadratic Residues, Proc. of Cryptography and Coding, LNCS 2260, Springer, pp. 360-363,2001.
-
(2001)
LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
9
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Advances in Cryptology-Crypto'86 Springer
-
A. Fiat, A. Shamir, How to Prove Yourself: Practical Solutions to Identification and Signature Problems , Advances in Cryptology-Crypto'86, LNCS 0263, Springer, pp. 186-194, 1986.
-
(1986)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
10
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Advances in Cryptology-Crypto'99 Springer
-
E. Fujisaki, T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes", Advances in Cryptology-Crypto'99, LNCS 1666, Springer, pp.537-554, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
11
-
-
35048817852
-
Encrypted message authentication by firewalls
-
Proc. of PKC'99 Springer
-
J C. Gamage, J. Leiwo, Y. Zheng, Encrypted message authentication by firewalls, Proc. of PKC'99, LNCS 1560, Springer, pp. 69-81, 1999
-
(1999)
LNCS
, vol.1560
, pp. 69-81
-
-
Gamage, J.C.1
Leiwo, J.2
Zheng, Y.3
-
13
-
-
84947558992
-
A "paradoxical" identity-based signature scheme resulting from zero-knowledge
-
Advances in Cryptology-Crypto'88 Springer
-
L. Guillou, J-J. Quisquater, A "Paradoxical" Identity-Based Signature Scheme Resulting From Zero-Knowledge , Advances in Cryptology-Crypto'88, LNCS 0403, Springer, pp. 216-231, 1988
-
(1988)
LNCS
, vol.403
, pp. 216-231
-
-
Guillou, L.1
Quisquater, J.-J.2
-
14
-
-
84939128902
-
Eficient identity based signaiure schemes based on pairings, to appear
-
proceedings of SAC Springer-Verlag
-
F. Hess, Eficient identity based signaiure schemes based on pairings, to appear in proceedings of SAC 2002. Springer Verlag, Lecture Notes in Computer Science series.
-
(2002)
Lecture Notes in Computer Science
-
-
Hess, F.1
-
15
-
-
84946844750
-
A one round protocol for tripartite Difie-Hellman
-
Proc. of ANTS-IV Springer
-
A. Jow, A one round protocol for tripartite Difie-Hellman, Proc. of ANTS-IV, Lecture Notes in Computer Science vol. 1838, Springer, pp. 385-394,2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1838
, pp. 385-394
-
-
Jow, A.1
-
20
-
-
84939138314
-
Two birds one stone: Signcryption using RSA, to appear in proceedings of CT-RSA 2003
-
Springer Verlag
-
J. Malone-Lee, W. Mao, Two Birds one Stone: Signcryption using RSA, to appear in proceedings of CT-RSA 2003. Springer Verlag, Lecture Notes in Computer Science.
-
Lecture Notes in Computer Science
-
-
Malone-Lee, J.1
Mao, W.2
-
21
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in afinitefield
-
A.J. Menezes, T. Okamoro, S. Vanstone, Reducing elliptic curve logarithms to logarithms in afinitefield, IEEE Trans. on Inf. Theory, vol. 39, pp. 1639-1646, 1993.
-
(1993)
IEEE Trans. on Inf. Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.J.1
Okamoro, T.2
Vanstone, S.3
-
23
-
-
84927727752
-
Security proofs for signature schemes, Advances in Cryptology-Eurocrypt'96
-
Springer
-
D. Pointcheval, J. Stern, Security proofs for signature schemes, Advances in Cryptology-Eurocrypt'96, LNCS 1070, Springer, pp. 387-398, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
24
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval, J. Stern, Security arguments for digital signatures and blind signatures, Journal of Cryptology, vol. 13-Number 3, pp. 361-396, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
25
-
-
1642358858
-
Cryptosystems based on pairing
-
January
-
R. Sakai, K. Ohgishi, M. Kasahara, Cryptosystems based on pairing, In The 2000 Sympoium on Cryptography and Information Security, Okinawa, Japan, January 2000.
-
(2000)
The2000 Sympoium on Cryptography and Information Security, Okinawa, Japan
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
26
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
Advances in Cryptology-Crypto' 84 Springer
-
A. Shamir, Identity Based Cryptosystems and Signature Schemes, Advances in Cryptology-Crypto' 84, LNCS 0196, Springer, 1984.
-
(1984)
LNCS
, vol.196
-
-
Shamir, A.1
-
27
-
-
0037142442
-
-
Eleceonic Letters, 38(13): 630-632,2002
-
(2002)
Eleceonic Letters
, vol.38
, Issue.13
, pp. 630-632
-
-
-
30
-
-
84944242785
-
A signcryption scheme based on integer fuctorization
-
R. Steinfeld, Y. Zheng, A Signcryption Scheme Based on Integer Fuctorization, Proc. of ISW'OO, pp. 308-322, 2000.
-
(2000)
Proc. of isw'Oo
, pp. 308-322
-
-
Steinfeld, R.1
Zheng, Y.2
-
31
-
-
84949961454
-
New signcryption schemes based on KCDSA
-
Proc. of ICISC'O1 Springer
-
B.H. Yum, P.J. Lee, New Signcryption Schemes Based on KCDSA, Proc. of ICISC'O1, LNCS 2288, Springer, pp. 305-317,2001.
-
(2001)
LNCS
, vol.2288
, pp. 305-317
-
-
Yum, B.H.1
Lee, P.J.2
-
32
-
-
84958765355
-
ID-Based blind signature and ring signature from pairings. Advances in cryptology-asiacrypt'02
-
Y. Zheng ed., Springer-Verlag
-
E Zhang, K. Kim, ID-Based Blind Signature and Ring Signature from Pairings. Advances in Cryptology-Asiacrypt'02, Lecture Notes in Computer Science vol. 2501, Y. Zheng ed., Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
-
-
Zhang, E.1
Kim, K.2
-
33
-
-
33644646469
-
Efiient signcryption schemes on elliptic curves
-
Chapman & Hall
-
Y. Zheng, H. Imai, Efiient Signcryption Schemes On Elliptic Curves, Proc. of IFIP/SEC'98, Chapman & Hall, 1998.
-
(1998)
Proc. of IFIP/SEC'98
-
-
Zheng, Y.1
Imai, H.2
-
34
-
-
63449122349
-
Digital signcryption or how to achieve cost (Signature & Encryption) Cost (Signature) + Cost (Encryption)
-
Advances in Cryptology-Crypto'97 Springer
-
Y. Zheng, Digital Signcryption or How to Achieve Cost (Signature & Encryption) Cost (Signature) + Cost (Encryption), Advances in Cryptology-Crypto'97, LNCS 1294, Springer, pp. 165-179, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
35
-
-
84937414347
-
Identi jication signature and signcryption using high order residues modulo an RSA composite
-
Proc. of PKC'O1 Springer
-
Y. Zheng, Identi Jication, Signature and Signcryption using High Order Residues Modulo an RSA Composite, Proc. of PKC'O1, LNCS 1992, Springer, pp. 48-63, 2001.
-
(1992)
LNCS
, vol.2001
, pp. 48-63
-
-
Zheng, Y.1
-
36
-
-
84947929166
-
Signcryption and its applications in eficient public key solutions
-
Y. Zheng, Signcryption and its applications in eficient public key solutions, Proc. of ISw97, pp. 291-312,1998.
-
(1998)
Proc. of ISw
, vol.97
, pp. 291-312
-
-
Zheng, Y.1
|