메뉴 건너뛰기




Volumn 839 LNCS, Issue , 1994, Pages 202-215

On the length of cryptographic hash-values used in identification schemes

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84955562814     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48658-5_21     Document Type: Conference Paper
Times cited : (45)

References (10)
  • 2
    • 0024135240 scopus 로고
    • Zero-knowledge proofs of identity
    • [FFS88] U. Feige, A. Fiat and A. Shamir, Zero-knowledge proofs of identity, Journal of Cryptology, Vol. 1, No 2, 1988, pp. 77–94.
    • (1988) Journal of Cryptology , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 5
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory
    • Springer-Verlag, Berlin
    • [GQ88] L.C. Guillou and J.J. Quisquater, A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory, Advances of Cryptology: Proceedings of EUROCRYPT’88, Lecture Notes in Computer Science, Vol. 330, Springer-Verlag, Berlin, 1988, pp. 123–128.
    • (1988) Advances of Cryptology: Proceedings of EUROCRYPT’88, Lecture Notes in Computer Science , vol.330 , pp. 123-128
    • Guillou, L.C.1    Quisquater, J.J.2
  • 6
    • 0023420534 scopus 로고
    • An efficient solution of the congruence x 2 + ky 2 = m (Mod n)
    • [PS87] J.M. Pollard and C.P. Schnorr, An efficient solution of the congruence x 2 + ky 2 = m (mod n), IEEE Transactions on Information Theory, Vol. IT-33, No 5, 1987, pp. 702–709.
    • (1987) IEEE Transactions on Information Theory , vol.IT-33 , Issue.5 , pp. 702-709
    • Pollard, J.M.1    Schnorr, C.P.2
  • 7
    • 0000537828 scopus 로고
    • Efficient identification and signature for smart cards, Advances of Cryptology
    • Springer-Verlag, Berlin
    • C.P. Schnorr, Efficient identification and signature for smart cards, Advances of Cryptology: Proceedings of CRYPTO’89, Lecture Notes in Computer Science, Vol. 435, Springer-Verlag, Berlin, 1987, pp. 239–252.
    • (1987) Proceedings of CRYPTO’89, Lecture Notes in Computer Science , vol.435 , pp. 239-252
    • Schnorr, C.P.1
  • 8
    • 85032871579 scopus 로고
    • An efficient identification scheme based on permuted kernels, Advances of Cryptology
    • Springer-Verlag, Berlin
    • A. Shamir, An efficient identification scheme based on permuted kernels, Advances of Cryptology: Proceedings of CRYPTO’89, Lecture Notes in Computer Science, Vol. 435, Springer-Verlag, Berlin, 1987, pp. 606–609.
    • (1987) Proceedings of CRYPTO’89, Lecture Notes in Computer Science , vol.435 , pp. 606-609
    • Shamir, A.1
  • 9
    • 84955606497 scopus 로고
    • An alternative to the Fiat-Shamir protocol, Advances of Cryptology
    • Springer-Verlag, Berlin
    • J. Stern, An alternative to the Fiat-Shamir protocol, Advances of Cryptology: Proceedings of EUROCRYPT’89, Lecture Notes in Computer Science, Vol. 434, Springer-Verlag, Berlin, 1990, pp. 173–180.
    • (1990) Proceedings of EUROCRYPT’89, Lecture Notes in Computer Science , vol.434 , pp. 173-180
    • Stern, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.