메뉴 건너뛰기




Volumn 1070, Issue , 1996, Pages 399-416

The exact security of digital signatures-how to sign with RSA and rabin

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; HASH FUNCTIONS;

EID: 84947906522     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-68339-9_34     Document Type: Conference Paper
Times cited : (653)

References (21)
  • 2
    • 0026466320 scopus 로고
    • How to sign given any trapdoor permutation
    • January
    • M. Bellare and S.Micali, "How to sign given any trapdoor permutation," JACM Vol. 39, No. 1, 214-233, January 1992.
    • (1992) JACM , vol.39 , Issue.1 , pp. 214-233
    • Bellare, M.1    Micali, S.2
  • 4
    • 0001868672 scopus 로고
    • Optimal Asymmetric Encryption
    • Lecture Notes in Computer Science, A. De Santis ed., Springer-Verlag
    • M. Bellare and P. Rogaway, "Optimal Asymmetric Encryption," Advances in Cryptology - Eurocrypt 94Proceedings, Lecture Notes in Computer Science Vol. 950, A. De Santis ed., Springer-Verlag, 1994.
    • (1994) Advances in Cryptology - Eurocrypt 94Proceedings , vol.950
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0017018484 scopus 로고
    • New directions in cryptography
    • November
    • W.Diffir and M. E. Hellman, "New directions in cryptography," IEEE Trans. Info. Theory IT-22, 644-654, November 1976.
    • (1976) IEEE Trans. Info. Theory , vol.IT-22 , pp. 644-654
    • Diffir, W.1    Hellman, M.E.2
  • 6
    • 84978970262 scopus 로고
    • An efficient existentially unforgeable signature scheme and its applications
    • Lecture Notes in Computer Science, Y. Desmedt ed., Springer-Verlag
    • C.DWORK AND M.Naor. An efficient existentially unforgeable signature scheme and its applications.Advances in Cryptology-Crypto 94Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.
    • (1994) Advances in Cryptology-Crypto 94 Proceedings , vol.839
    • Dwork, C.1    Naor, M.2
  • 7
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • July
    • T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, Vol. 31, No. 4, July 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4
    • El Gamal, T.1
  • 8
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Lecture Notes in Computer Science, A. Odlyzko ed., Springer-Verlag
    • A.Fiat and A.Shamir, "How to prove yourself: practical solutions to identification and signature problems," Advances in Cryptology-Crypto 86Proceedings, Lecture Notes in Computer Science Vol. 263, A. Odlyzko ed., Springer-Verlag, 1986.
    • (1986) Advances in Cryptology-Crypto 86Proceedings , vol.263
    • Fiat, A.1    Shamir, A.2
  • 9
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • S.Goldwasser, S.Micali and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," SIAM Journal of Computing, 17(2):281- 308, April 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 13
    • 0000705060 scopus 로고    scopus 로고
    • Security proofs for signatures
    • Lecture Notes in Computer Science, U. Maurer ed., Springer-Verlag
    • D.Pointcheval and J.Stern, "Security proofs for signatures," Advances in cryptology-Eurocrypt 96 Proceedings, Lecture Notes in Computer Science, U. Maurer ed., Springer-Verlag, 1996.
    • (1996) Advances in cryptology-Eurocrypt 96 Proceedings
    • Pointcheval, D.1    Stern, J.2
  • 18
    • 0347802687 scopus 로고
    • Digital signatures
    • R. A. Millo et. al. eds, Academic Press
    • M. Rabin, "Digital signatures," inFoundations of secure computation, R. A. Millo et. al. eds, Academic Press, 1978.
    • (1978) Foundations of secure computation
    • Rabin, M.1
  • 21
    • 0019080452 scopus 로고
    • A modification of the RSA public key encryption procedure
    • November
    • H. Williams, "A modification of the RSA public key encryption procedure," IEEE Transactions on Information Theory, Vol. IT-26, No. 6, November 1980.
    • (1980) IEEE Transactions on Information Theory , vol.IT-26 , Issue.6
    • Williams, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.