-
1
-
-
85030310286
-
How to keep authenticity alive in a computer network
-
Springer-Verlag
-
F. Bauspieβ and H. Knobloch, “How to keep authenticity alive in a computer network”, Advances in Cryptology (Proceedings of EuroCrypt ‘89), Lecture Notes in Computer Science, vol. 434, Springer-Verlag, 1990, pp. 38-46
-
(1990)
Advances in Cryptology (Proceedings of Eurocrypt ‘89), Lecture Notes in Computer Science
, vol.434
, pp. 38-46
-
-
Bauspieβ, F.1
Knobloch, H.2
-
2
-
-
85034644807
-
Efficient zero-knowledge identification scheme for smart cards
-
Springer-Verlag
-
T. Beth, “Efficient zero-knowledge identification scheme for smart cards”, Advances in Cryptology (Proceedings of EuroCrypt ‘88), Lecture Notes in Computer Science, vol. 330, Springer-Verlag, 1988, pp. 77-84
-
(1988)
Advances in Cryptology (Proceedings of Eurocrypt ‘88), Lecture Notes in Computer Science
, vol.330
, pp. 77-84
-
-
Beth, T.1
-
3
-
-
0024139987
-
A key-exchange system based on imaginary quadratic fields
-
J. Buchmann and H. Williams, “A key-exchange system based on imaginary quadratic fields”, Journal of Cryptology, vol. 1, no. 2, 1988, pp. 107-118
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 107-118
-
-
Buchmann, J.1
Williams, H.2
-
5
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. E1Gamal, “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Trans. Inform. Theory, vol. 31, 1985, pp. 469-472
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, pp. 469-472
-
-
E1gamal, T.1
-
6
-
-
84937570422
-
Self-certified public keys
-
Springer-Verlag
-
M. Girault, “Self-certified public keys”, Advances in Cryptology (Proceedings of EuroCrypt ‘91), Lecture Notes in Computer Science, vol. 547, Springer-Verlag, 1991, pp. 490-497
-
(1991)
Advances in Cryptology (Proceedings of Eurocrypt ‘91), Lecture Notes in Computer Science
, vol.547
, pp. 490-497
-
-
Girault, M.1
-
7
-
-
84969368443
-
An identity-based Key-exchange protocol
-
Springer-Verlag
-
C. Günther, “An identity-based Key-exchange protocol”, Advances in Cryptology (Proceedings of EuroCrypt ‘89), Lecture Notes in Computer Science, vol. 434, Springer-Verlag, 1990, pp. 29-37
-
(1990)
Advances in Cryptology (Proceedings of Eurocrypt ‘89), Lecture Notes in Computer Science
, vol.434
, pp. 29-37
-
-
Günther, C.1
-
8
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, “Elliptic curve cryptosystems”, Math. Comp., vol. 48, 1987, pp. 203-209
-
(1987)
Math. Comp
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
9
-
-
0024139776
-
A key distribution system equivalent to factoring
-
K. McCurley, “A key distribution system equivalent to factoring”, Journal of Cryptoloyy, vol. 1, no. 2, 1988, pp. 95-105
-
(1988)
Journal of Cryptoloyy
, vol.1
, Issue.2
, pp. 95-105
-
-
McCurley, K.1
-
10
-
-
85015402934
-
Use of elliptic curves in cryptosystems
-
Springer-Verlag
-
V. Miller, “Use of elliptic curves in cryptosystems”, Advances in Cryptology (Proceedings of Crypto ‘85), Lecture Notes in Computer Science, vol. 218, Springer-Verlag, 1986, pp. 417-426
-
(1986)
Advances in Cryptology (Proceedings of Crypto ‘85), Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
11
-
-
0017930809
-
A method for obtaining Digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir and L. Adleman, “A method for obtaining Digital signatures and public-key cryptosystems”, Comm. A CM, vol. 21, 1978, pp. 120-126
-
(1978)
Comm. A CM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
12
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. Schnorr, “Efficient signature generation by smart cards”, Journal of Cryptology, vol. 4, no. 3, 1991, pp. 161-174
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.1
|