-
1
-
-
84948957152
-
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements
-
LNCS, Berlin, Springer-Verlag
-
M. Bellare, A. Boldyreva, and S. Micali. Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. In EUROCRYPT 2000, volume 1807 of LNCS, pages 259-274, Berlin, 2000. Springer-Verlag.
-
(2000)
EUROCRYPT 2000
, vol.1807
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
2
-
-
84958639277
-
Efficient Generation of Shared RSA Keys
-
LNCS, Berlin, Springer-Verlag
-
D. Boneh and M. Franklin. Efficient Generation of Shared RSA Keys. In CRYPTO'97, volume 1294 of LNCS, pages 425-439, Berlin, 1997. Springer-Verlag.
-
(1994)
CRYPTO 97
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
77956089601
-
Factorization of a 512-Bit RSA Modulus
-
LNCS, Berlin, Springer-Verlag
-
S. Cavallar et al. Factorization of a 512-Bit RSA Modulus. In EUROCRYPT 2000, volume 1807 of LNCS, pages 1-18, Berlin, 2000. Springer-Verlag.
-
(2000)
EUROCRYPT 2000
, vol.1807
, pp. 1-18
-
-
Cavallar, S.1
-
4
-
-
0024984004
-
Witness Indistinguishable and Witness Hiding Protocols
-
ACM
-
U. Feige and A. Shamir. Witness Indistinguishable and Witness Hiding Protocols. In Proc. 22-nd STOC, pages 416-426. ACM, 1990.
-
(1990)
Proc. 22-Nd STOC
, pp. 416-426
-
-
Feige, U.1
Shamir, A.2
-
5
-
-
84944256305
-
-
FIPS 186-2, Digital Signature Standard., Federal Information Processing Standards Publication 186-2, Available from
-
FIPS 186-2, Digital Signature Standard. Federal Information Processing Standards Publication 186-2, 2000. Available from http://csrc.nist.gov/.
-
(2000)
-
-
-
6
-
-
84937570422
-
Self-Certified Public Keys
-
LNCS, Berlin, Springer-Verlag
-
M. Girault. Self-Certified Public Keys. In EUROCRYPT '91, volume 547 of LNCS, pages 490-497, Berlin, 1992. Springer-Verlag.
-
(1992)
EUROCRYPT '91
, vol.547
, pp. 490-497
-
-
Girault, M.1
-
7
-
-
0023985465
-
A Digital Signature Scheme Secure against Adaptively Chosen Message Attacks
-
S. Goldwasser, S. Micali, and R. Rivest. A Digital Signature Scheme Secure against Adaptively Chosen Message Attacks. SIAM Journal on Computing, 17(2):281-308, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
8
-
-
84957812088
-
Selecting Cryptographic Key Sizes
-
LNCS, Berlin, Springer-Verlag
-
A. Lenstra and E. Verheul. Selecting Cryptographic Key Sizes. In PKC2000, volume 1751 of LNCS, pages 446-465, Berlin, 2000. Springer-Verlag.
-
(2000)
PKC2000
, vol.1751
, pp. 446-465
-
-
Lenstra, A.1
Verheul, E.2
-
9
-
-
84957794940
-
The Composite Discrete Logarithm and Secure Authentication
-
LNCS, Berlin, Springer-Verlag
-
D. Pointcheval. The Composite Discrete Logarithm and Secure Authentication. In PKC2000, volume 1751 of LNCS, pages 113-128, Berlin, 2000. Springer-Verlag.
-
(2000)
PKC2000
, vol.1751
, pp. 113-128
-
-
Pointcheval, D.1
-
11
-
-
84957640282
-
Security Analysis of a Practical "on the fly" Authentication and Signature Generation
-
LNCS, Berlin, Springer-Verlag
-
G. Poupard and J. Stern. Security Analysis of a Practical "on the fly" Authentication and Signature Generation. In EUROCRYPT'98, volume 1403 of LNCS, pages 422-436, Berlin, 1998. Springer-Verlag.
-
(1403)
EUROCRYPT'98
, pp. 422-436
-
-
Poupard, G.1
Stern, J.2
-
12
-
-
84957796827
-
Short Proofs of Knowledge for Factoring
-
LNCS, Berlin, Springer-Verlag
-
G. Poupard and J. Stern. Short Proofs of Knowledge for Factoring. In PKC 2000, volume 1751 of LNCS, pages 147-166, Berlin, 2000. Springer-Verlag.
-
(2000)
PKC 2000
, vol.1751
, pp. 147-166
-
-
Poupard, G.1
Stern, J.2
-
13
-
-
0000537828
-
Efficient Identification and Signatures for Smart Cards
-
LNCS, Berlin, Springer-Verlag
-
C. P. Schnorr. Efficient Identification and Signatures for Smart Cards. In CRYPTO'89, volume 435 of LNCS, pages 239-251, Berlin, 1990. Springer-Verlag.
-
(1990)
CRYPTO'89
, vol.435
, pp. 239-251
-
-
Schnorr, C.P.1
-
14
-
-
84944242278
-
-
SEC2. Recommended Elliptic Curve Domain Parameters, September 2000. Standards for Efficient Cryptography Group. Available from
-
SEC2. Recommended Elliptic Curve Domain Parameters, September 2000. Standards for Efficient Cryptography Group. Available from http://www.secg.org/.
-
-
-
-
15
-
-
63449122349
-
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)
-
LNCS, Berlin, Springer-Verlag
-
Y. Zheng. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). In CRYPTO'97, volume 1294 of LNCS, pages 165-179, Berlin, 1997. Springer-Verlag.
-
(1997)
CRYPTO'97
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
|