-
2
-
-
84947906522
-
The Exact Security of Digital Signatures –How to Sign with RSA and Rabin
-
M. Bellare and P. Rogaway, “The Exact Security of Digital Signatures –How to Sign with RSA and Rabin,” Proc. of Eurocrypt’96, Springer-Verlag, LNCS, pp.399–416, 1996. 378, 379
-
(1996)
Proc. Of Eurocrypt’96, Springer-Verlag, LNCS
, Issue.378
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84957693225
-
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1
-
D. Bleichenbacher, “Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1,” Proc. of Crypto’98, LNCS 1462, Springer-Verlag, pp. 1–12, 1998. 378
-
(1998)
Proc. Of Crypto’98, LNCS 1462, Springer-Verlag
, vol.112
, pp. 378
-
-
Bleichenbacher, D.1
-
4
-
-
0031619016
-
The Random Oracle Methodology, Revisited
-
R. Canetti, O. Goldreich and S. Halevi, “The Random Oracle Methodology, Revisited,” Proc. of STOC, ACM Press, pp.209–218, 1998. 379
-
(1998)
Proc. Of STOC, ACM Press
, vol.379
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
5
-
-
84956859465
-
On the Security of RSA Padding
-
Springer-Verlag,LNCS
-
J.S., D. Naccache and J.P. Stern, “On the Security of RSA Padding,” Proc. of Crypto’99, Springer-Verlag, LNCS, 1999. 378
-
(1999)
Proc. Of Crypto’99
, vol.378
-
-
Naccache, J.S.D.1
Stern, J.P.2
-
6
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Transactions on Information Theory, IT-31, 4, pp.469– 472, 1985.
-
(1985)
IEEE Transactions on Information Theory, IT-31, 4
, vol.4
, pp. 469-472
-
-
Elgamal, T.1
-
7
-
-
84990731886
-
How to Prove Yourself
-
Springer-Verlag, LNCS
-
A. Fiat and A. Shamir, “How to Prove Yourself,” Proc. of Crypto’86, Springer-Verlag, LNCS, pp.186–194.
-
Proc. Of Crypto’86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
8
-
-
0024135240
-
Zero-Knowledge Proofs of Identity
-
U. Feige, A. Fiat and A. Shamir, “Zero-Knowledge Proofs of Identity,” J. of Cryp-tology, 1, p.77–94, 1988. 385
-
(1988)
J. Of Cryp-Tology, 1
, vol.385
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
9
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
S. Goldwasser, S. Micali and R. Rivest, “A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks,” SIAM J. on Computing, 17, pp.281– 308, 1988. 379
-
(1988)
SIAM J. On Computing, 17
, vol.379
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
10
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
N. Koblitz, “Elliptic Curve Cryptosystems,” Mathematics of Computation, 48, pp.203–209, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
11
-
-
84955571277
-
A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves
-
A. Miyaji, “A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves,” Proc. of Asiacrypt’96, Springer-Verlag, LNCS, pp. 1–14, 1996. 378, 379
-
(1996)
Proc. Of Asiacrypt’96, Springer-Verlag, LNCS, Pp.
, vol.378-379
, pp. 1-14
-
-
Miyaji, A.1
-
12
-
-
0024867751
-
Universal One-Way Hash Functions and Their Cryptographic Applications
-
M. Naor and M. Yung, “Universal One-Way Hash Functions and Their Cryptographic Applications,” Proc. of STOC, pp.33–43, 1989.
-
(1989)
Proc. Of STOC
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
14
-
-
84948973239
-
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem
-
K. Nyberg and R.A. Rueppel, “Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem,” Proc. of Eurocrypt’94, Springer-Verlag, LNCS, pp.182–193, 1995. 378
-
(1995)
Proc. Of Eurocrypt’94, Springer-Verlag, LNCS
, vol.378
, pp. 182-193
-
-
Nyberg, K.1
Rueppel, R.A.2
-
15
-
-
0002670834
-
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem
-
K. Nyberg and R.A. Rueppel, “Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem,” Designs, Codes and Cryptography, 7, pp.61–81, 1996. 378
-
(1996)
Designs, Codes and Cryptography, 7
, vol.378
, pp. 61-81
-
-
Nyberg, K.1
Rueppel, R.A.2
-
16
-
-
84957705622
-
On the Concrete Security Treatment of Signatures Derived from Identification
-
K. Ohta and T. Okamoto, “On the Concrete Security Treatment of Signatures Derived from Identification,” Proc. of Crypto’98, Springer-Verlag, LNCS, 1998. 381, 382, 383
-
(1998)
Proc. Of Crypto’98, Springer-Verlag, LNCS
, vol.381
, Issue.382
-
-
Ohta, K.1
Okamoto, T.2
-
17
-
-
84927727752
-
Security Proofs for Signature Schemes
-
D. Pointcheval and J. Stern, “Security Proofs for Signature Schemes,” Proc. of Eurocrypt’96, Springer-Verlag, LNCS, pp.387–398, 1996.
-
(1996)
Proc. Of Eurocrypt’96, Springer-Verlag, LNCS
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
18
-
-
0025152622
-
One-Way Functions are Necessary and Sufficient for Secure Signature
-
J. Rompel, “One-Way Functions are Necessary and Sufficient for Secure Signature,” Proc. of STOC, pp.387–394, 1990.
-
(1990)
Proc. Of STOC
, pp. 387-394
-
-
Rompel, J.1
-
19
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
-
R. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,” Communications of ACM, 21, 2, pp.120-126, 1978.
-
(1978)
Communications of ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
20
-
-
0000537828
-
Efficient Identification and Signatures for Smart Card
-
C.P. Schnorr, “Efficient Identification and Signatures for Smart Card,” Proc. of Eurocrypt’89, Springer-Verlag, LNCS, pp.235–251, 1990.
-
(1990)
Proc. Of Eurocrypt’89, Springer-Verlag, LNCS
, pp. 235-251
-
-
Schnorr, C.P.1
|