-
1
-
-
84948991087
-
A secure and efficient conference key distribution system
-
Lecture Notes in Computer Science, Springer-Verlag
-
M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system," Advances in Cryptology (Proceedings of Eurocrypt '94), Lecture Notes in Computer Science, vol. 950, Springer-Verlag, 1994, pp. 275-286
-
(1994)
Advances in Cryptology (Proceedings of Eurocrypt'94)
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
3
-
-
0024135240
-
Zero-knowledge proofs of identity
-
U. Feige, A. Fiat and A. Shamir, "Zero-knowledge proofs of identity," Journal of Cryptology, vol. 1, no. 2, 1988, pp, 77-94
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
4
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali and C. Rackoff, ''The knowledge complexity of interactive proof systems," SIAM J. Comp., vol. 18, 1989, pp. 186-208
-
(1989)
SIAM J. Comp
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
5
-
-
0024139776
-
A key distribution system equivalent to factoring
-
K. McCurley, "A key distribution system equivalent to factoring," Journal of Cryptology, vol. 1, no. 2, 1988, pp. 95-105
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 95-105
-
-
McCurley, K.1
-
6
-
-
84964242030
-
Key distribution systems based on identification information
-
Lecture Notes in Computer Science, Springer-Verlag
-
E. Okamoto, ''Key distribution systems based on identification information," Advances in Cryptology (Proceedings of Crypto '87), Lecture Notes in Computer Science, vol. 293, Springer-Verlag, 1988, pp. 194-202
-
(1988)
Advances in Cryptology (Proceedings of Crypto'87)
, vol.293
, pp. 194-202
-
-
Okamoto, E.1
-
7
-
-
84957867844
-
Identity-based and self-certified key-exchange protocols
-
Lecture Notes in Computer Science, Springer-Verlag
-
S. Saeednia, ''Identity-based and self-certified key-exchange protocols," Information Security and Privacy (Proceedings of ACISP '97), Lecture Notes in Computer Science, vol. 1270, Springer-Verlag, 1997, pp. 303-313
-
(1997)
Information Security and Privacy (Proceedings of ACISP '97)
, vol.1270
, pp. 303-313
-
-
Saeednia, S.1
-
8
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Lecture Notes in Computer Science, Springer-Verlag
-
A. Shamir, ''Identity-based cryptosystems and signature schemes," Advances in Cryptology (Proceedings of Crypto '84), Lecture Notes in Computer Science, vol. 196, Springer-Verlag, 1985, pp. 47-53
-
(1985)
Advances in Cryptology (Proceedings of Crypto '84)
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
9
-
-
84875345293
-
-
Technical Report 356, Computer Science Department, Technion, Feb
-
Z. Shmuley, ''Composite Diffie-Hellman public-key generating systems are hard to break," Technical Report 356, Computer Science Department, Technion, Feb, 1985
-
(1985)
Composite Diffie-Hellman public-key generating systems are hard to break
-
-
Shmuley, Z.1
|