-
1
-
-
85031773397
-
Secure Audio Teleconference, Advances in Cryptology — Crypto'87
-
Brickell, E., Lee, P. and Yacobi, Y.: “Secure Audio Teleconference,” Advances in Cryptology — Crypto'87, Lecture Notes in Computer Science 293, 1988, pp.429-433
-
(1988)
Lecture Notes in Computer Science
, vol.293
, pp. 429-433
-
-
Brickell, E.1
Lee, P.2
Yacobi, Y.3
-
2
-
-
0020707921
-
Applying the RSA digital signature to electric mail
-
Feb
-
Davies, D. W.: “Applying the RSA digital signature to electric mail,” IEEE Computer (Feb. 1983), pp.55-62
-
(1983)
IEEE Computer
, pp. 55-62
-
-
Davies, D.W.1
-
3
-
-
0023569922
-
Zero Knowledge Proofs of Identity
-
Feige, U., Fiat, A. and Shamir, A.: “Zero Knowledge Proofs of Identity,” Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987, pp.210-217
-
(1987)
Proceedings of the 19Th Annual ACM Symposium on Theory of Computing
, pp. 210-217
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
4
-
-
84990731886
-
“How to Prove Yourself: Practical Solution to Identification and Signature Problems,” Advances in Cryptology — Crypto'86
-
Fiat, A. and Shamir, A.: “How to Prove Yourself: Practical Solution to Identification and Signature Problems,” Advances in Cryptology — Crypto'86, Lecture Notes in Computer Science 263, 1987, pp.186-199
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 186-199
-
-
Fiat, A.1
Shamir, A.2
-
5
-
-
0001654317
-
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Tranamission and Memory
-
Guillou, L.C., and Quisquater, J.J.: “A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Tranamission and Memory,” Eurocrypt'88 Abstracts, 1988, pp.71-75
-
(1988)
Eurocrypt'88 Abstracts
, pp. 71-75
-
-
Guillou, L.C.1
Quisquater, J.J.2
-
6
-
-
84947558992
-
A Paradoxical Identity-Based Signature Scheme Resulting from Zero-Knowledge
-
Guillou, L.C., and Quisquater, J.J.:“A Paradoxical Identity-Based Signature Scheme Resulting from Zero-Knowledge,” Proceedings of Crypto'88,Lecture Notes in Computer Science 403, 1988, pp.216-231
-
(1988)
Proceedings of Crypto'88,Lecture Notes in Computer Science
, vol.403
, pp. 216-231
-
-
Guillou, L.C.1
Quisquater, J.J.2
-
8
-
-
0020832088
-
A public-key cryptosystem suitable for digital multisignature
-
Oct
-
Itakura, K., and Nakamura, K.: “A public-key cryptosystem suitable for digital multisignature,” NEC J. Res. Dev. 71 (Oct. 1983)
-
(1983)
NEC J. Res. Dev
, pp. 71
-
-
Itakura, K.1
Nakamura, K.2
-
9
-
-
0024104968
-
A digital Multisignature Scheme Using Bijective Public-Key Cryptosystems
-
Okamoto, T.: “A digital Multisignature Scheme Using Bijective Public-Key Cryptosystems,” ACM Trans. on Comp. Systems, Vol. 6, No. 8, 1988, pp.432-441
-
(1988)
ACM Trans. on Comp. Systems
, vol.6
, Issue.8
, pp. 432-441
-
-
Okamoto, T.1
-
10
-
-
0024053244
-
Practical Extension of Fiat-Shamir Scheme
-
Revised version: Proceedings of Crypto'88
-
Ohta, K. and Okamoto, T.: “Practical Extension of Fiat-Shamir Scheme,” Electron.Lett., 24, No. 15, 1988, pp.955-956 (Revised version: Proceedings of Crypto'88, 1988, pp.232-243)
-
(1988)
Electron.Lett.
, vol.24
, Issue.15
, pp. 232-243
-
-
Ohta, K.1
Okamoto, T.2
-
11
-
-
0025207738
-
A fast signature scheme based on quadratic inequalities
-
IEEE, New York, 1985, pp.123-132 (Revised version: IEEE Trans. Information Theory
-
Okamoto, T., and Shiraishi, A.: “A fast signature scheme based on quadratic inequalities,” Proceedings of the IEEE Symposium and Provacy (Oakland, Calif., April, 1979), IEEE, New York, 1985, pp.123-132 (Revised version: IEEE Trans. Information Theory, Vol.IT-36, No.1, 1990, pp.47-53)
-
(1990)
Proceedings of the IEEE Symposium and Provacy (Oakland, Calif., April, 1979)
, vol.IT-36
, Issue.1
, pp. 47-53
-
-
Okamoto, T.1
Shiraishi, A.2
-
12
-
-
0023435026
-
A Single Public-Key Authentication Scheme for Multiple Users
-
IN83-92 (January 1984) (Revised version: Systems and Computers in Japan, translated from IECE Japan Transactions, J69-D, 10, pp.1481-1489 (1986))
-
Okamoto, T., Shiraishi, A., and Kawaoka, T.: “A Single Public-Key Authentication Scheme for Multiple Users,” Technical report of IECE Japan, IN83-92 (January 1984) (Revised version: Systems and Computers in Japan, 18, 10, pp.14-24 (1987); translated from IECE Japan Transactions, J69-D, 10, pp.1481-1489 (1986)).
-
(1987)
Technical Report of IECE Japan
, vol.18
, Issue.10
, pp. 14-24
-
-
Okamoto, T.1
Shiraishi, A.2
Kawaoka, T.3
-
13
-
-
0003614758
-
-
Tech. Rep. MIT/LCS/TR-212, MIT, Cambridge, Mass
-
Rabin, M. O.: “Digitalized signatures and public-key functions as intractable as factorization,” Tech. Rep. MIT/LCS/TR-212, MIT, Cambridge, Mass., 1979
-
(1979)
Digitalized Signatures and Public-Key Functions as Intractable as Factorization
-
-
Rabin, M.O.1
-
14
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R.L., Shamir, A. and Adleman, L.: “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communication of the ACM, Vol. 21, No. 2, 1978, pp.120-126
-
(1978)
Communication of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
|