-
2
-
-
0026466320
-
How to sign given any trapdoor permutation
-
January
-
M. Bellare and S.Micali, "How to sign given any trapdoor permutation," JACM Vol. 39, No. 1, 214-233, January 1992.
-
(1992)
JACM
, vol.39
, Issue.1
, pp. 214-233
-
-
Bellare, M.1
Micali, S.2
-
4
-
-
0001868672
-
Optimal Asymmetric Encryption
-
Lecture Notes in Computer Science, A. De Santis ed., Springer-Verlag
-
M. Bellare and P. Rogaway, "Optimal Asymmetric Encryption," Advances in Cryptology - Eurocrypt 94Proceedings, Lecture Notes in Computer Science Vol. 950, A. De Santis ed., Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - Eurocrypt 94Proceedings
, vol.950
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0017018484
-
New directions in cryptography
-
November
-
W.Diffir and M. E. Hellman, "New directions in cryptography," IEEE Trans. Info. Theory IT-22, 644-654, November 1976.
-
(1976)
IEEE Trans. Info. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffir, W.1
Hellman, M.E.2
-
6
-
-
84978970262
-
An efficient existentially unforgeable signature scheme and its applications
-
Lecture Notes in Computer Science, Y. Desmedt ed., Springer-Verlag
-
C.DWORK AND M.Naor. An efficient existentially unforgeable signature scheme and its applications.Advances in Cryptology-Crypto 94Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology-Crypto 94 Proceedings
, vol.839
-
-
Dwork, C.1
Naor, M.2
-
7
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, Vol. 31, No. 4, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
-
-
El Gamal, T.1
-
8
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Lecture Notes in Computer Science, A. Odlyzko ed., Springer-Verlag
-
A.Fiat and A.Shamir, "How to prove yourself: practical solutions to identification and signature problems," Advances in Cryptology-Crypto 86Proceedings, Lecture Notes in Computer Science Vol. 263, A. Odlyzko ed., Springer-Verlag, 1986.
-
(1986)
Advances in Cryptology-Crypto 86Proceedings
, vol.263
-
-
Fiat, A.1
Shamir, A.2
-
9
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
S.Goldwasser, S.Micali and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," SIAM Journal of Computing, 17(2):281- 308, April 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
13
-
-
0000705060
-
Security proofs for signatures
-
Lecture Notes in Computer Science, U. Maurer ed., Springer-Verlag
-
D.Pointcheval and J.Stern, "Security proofs for signatures," Advances in cryptology-Eurocrypt 96 Proceedings, Lecture Notes in Computer Science, U. Maurer ed., Springer-Verlag, 1996.
-
(1996)
Advances in cryptology-Eurocrypt 96 Proceedings
-
-
Pointcheval, D.1
Stern, J.2
-
18
-
-
0347802687
-
Digital signatures
-
R. A. Millo et. al. eds, Academic Press
-
M. Rabin, "Digital signatures," inFoundations of secure computation, R. A. Millo et. al. eds, Academic Press, 1978.
-
(1978)
Foundations of secure computation
-
-
Rabin, M.1
-
21
-
-
0019080452
-
A modification of the RSA public key encryption procedure
-
November
-
H. Williams, "A modification of the RSA public key encryption procedure," IEEE Transactions on Information Theory, Vol. IT-26, No. 6, November 1980.
-
(1980)
IEEE Transactions on Information Theory
, vol.IT-26
, Issue.6
-
-
Williams, H.1
|