-
1
-
-
80051700126
-
-
InAsiacrypt '96,LNCS 1163, Springer-Verlag, Berlin
-
R. Anderson and S. Vaudenay. Minding your p's and q's. In Asiacrypt '96,LNCS 1163, pages 26-35. Springer-Verlag, Berlin, 1996.
-
(1996)
Minding Your P's and Q's
, pp. 26-35
-
-
Anderson, R.1
Vaudenay, S.2
-
3
-
-
84948986458
-
-
InEurocrypt '94,LNCS 950, Springer-Verlag,Berlin
-
M. Bellare and P. Rogaway. Optimal Asymmetric Encryption - How to Encrypt with RSA. In Eurocrypt '94, LNCS 950, pages 92-111. Springer-Verlag, Berlin, 1995.
-
(1995)
Optimal Asymmetric Encryption - How to Encrypt with RSA
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84947906522
-
-
InEurocrypt '96,LNCS 1070, Springer-Verlag,Berlin
-
M. Bellare and P. Rogaway. The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In Eurocrypt '96, LNCS 1070, pages 399-416. Springer-Verlag, Berlin, 1996.
-
(1996)
The Exact Security of Digital Signatures - How to Sign with RSA and Rabin
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
84957818977
-
-
E. F. Brickell. Invited lecture given at the Crypto '96 conference. unpublished manuscript.
-
-
-
Brickell, E.F.1
-
8
-
-
0031619016
-
-
InProc. of the 30th STOC, ACM Press, New York
-
R. Canetti, O. Goldreich, and S. Halevi. The RandomOracles Methodology, Revisited. In Proc. of the 30th STOC, pages 209-218. ACM Press, New York, 1998.
-
(1998)
The Randomoracles Methodology, Revisited
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
10
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory, IT-31(4):469-472, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
12
-
-
84990731886
-
-
InCrypto '86,LNCS 263, Springer-Verlag, Berlin
-
A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions of Identification and Signature Problems. In Crypto '86, LNCS 263, pages 186-194. Springer-Verlag, Berlin, 1987.
-
(1987)
How to Prove Yourself: Practical Solutions of Identification and Signature Problems
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
13
-
-
84955562814
-
-
InCrypto '94,LNCS 839, Springer-Verlag, Berlin
-
M. Girault and J. Stern. On the Length of Cryptographic Hash-Values used in Identification Schemes. In Crypto '94, LNCS 839, pages 202-215. Springer-Verlag, Berlin, 1994.
-
(1994)
On the Length of Cryptographic Hash-Values Used in Identification Schemes
, pp. 202-215
-
-
Girault, M.1
Stern, J.2
-
14
-
-
0021555016
-
-
In , Proc. , of the 25th , FOCS, IEEE, New York
-
S. Goldwasser, S. Micali, and R. Rivest. A “Paradoxical” Solution to the Signature Problem. In Proc. of the 25th FOCS, pages 441-448. IEEE, New York, 1984.
-
(1984)
A “Paradoxical” Solution to the Signature Problem
, pp. 441-448
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
15
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
S. Goldwasser, S. Micali, and R. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM Journal of Computing, 17(2):281-308, April 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
17
-
-
84957818979
-
-
KCDSA Task Force Team. The Korean Certificate-based Digital Signature Algorithm. IEEE P1363a Submission, August 1998. Available from http://grouper.ieee.org/groups/1363/addendum.html.
-
-
-
-
18
-
-
33745599342
-
-
InAsiacrypt 98,LNCS 1514, Springer-Verlag, Berlin
-
C. H. Limand P.J. Lee. A Study on the Proposed Korean Digital Signature Algorithm. In Asiacrypt 98, LNCS 1514, pages 175-186. Springer-Verlag, Berlin, 1998.
-
(1998)
A Study on the Proposed Korean Digital Signature Algorithm
, pp. 175-186
-
-
Limand, C.H.1
Lee, P.J.2
-
20
-
-
84957818981
-
-
NIST. Digital Signature Standard (DSS). Federal Information Processing Standards Publication 186, November 1994
-
NIST. Digital Signature Standard (DSS). Federal Information Processing Standards Publication 186, November 1994.
-
-
-
-
21
-
-
84957818982
-
-
NIST. Secure Hash Standard (SHS). Federal Information Processing Standards Publication 180-1, April 1995
-
NIST. Secure Hash Standard (SHS). Federal Information Processing Standards Publication 180-1, April 1995.
-
-
-
-
22
-
-
84957705622
-
-
InCrypto '98,LNCS 1462, Springer-Verlag, Berlin
-
K. Ohta and T. Okamoto. On Concrete Security Treatment of Signatures Derived fromIdentification. In Crypto '98, LNCS 1462, pages 354-369. Springer-Verlag, Berlin, 1998.
-
(1998)
On Concrete Security Treatment of Signatures Derived Fromidentification
, pp. 354-369
-
-
Ohta, K.1
Okamoto, T.2
-
23
-
-
84957818983
-
-
D. Pointcheval and J. Stern. Security Arguments for Digital Signatures and Blind Signatures. Journal ofCryptology, 1999. Available from http://www.di.ens.fr/~pointche.
-
-
-
Pointcheval, D.1
Stern, J.2
-
26
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
29
-
-
12344258539
-
Efficient Signature Generation by Smart Cards
-
C. P. Schnorr. Efficient Signature Generation by Smart Cards. Journal of Cryptology, 4(3):161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
30
-
-
1842499869
-
-
InEurocrypt '96,LNCS 1070, Springer-Verlag, Berlin
-
P. C. van Oorschot and M. J. Wiener. On Diffie-Hellman Key Agreement with Short Exponents. In Eurocrypt '96, LNCS 1070, pages 332-343. Springer-Verlag, Berlin, 1996.
-
(1996)
On Diffie-Hellman Key Agreement with Short Exponents
, pp. 332-343
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
-
31
-
-
84955603054
-
-
InCrypto 96,LNCS 1109, Springer-Verlag, Berlin
-
S. Vaudenay. Hidden Collisions on DSS. In Crypto 96, LNCS 1109, pages 83-88. Springer-Verlag, Berlin, 1996.
-
(1996)
Hidden Collisions on DSS
, pp. 83-88
-
-
Vaudenay, S.1
|