-
1
-
-
84937427768
-
A new forward-secure digital signature scheme
-
Lecture Notes in Computer Science, T. Okamoto ed., Springer-Verlag
-
M. Abdalla and L. Reyzin. A new forward-secure digital signature scheme. Advances in Cryptology – ASIACRYPT’00, Lecture Notes in Computer Science Vol. 1976, T. Okamoto ed., Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology – ASIACRYPT’00
, vol.1976
-
-
Abdalla, M.1
Reyzin, L.2
-
2
-
-
35248869043
-
The One-More-RSA-Inversion problems and the security of Chaum’s blind signature scheme
-
Cryptology ePrint Archive: Report 2001/002, Preliminary version, entitled “The power of RSA inversion oracles and the security of Chaum’s RSA-based blind signature scheme, Lecture Notes in Computer Science, P. Syverson ed., Springer-Verlag
-
M. Bellare, C. Namprempre, D. Pointcheval and M. Semanko. The One-More-RSA-Inversion problems and the security of Chaum’s blind signature scheme. Cryptology ePrint Archive: Report 2001/002, http://eprint.iacr.org/2001/002/. Preliminary version, entitled “The power of RSA inversion oracles and the security of Chaum’s RSA-based blind signature scheme,” in Financial Cryptography’01, Lecture Notes in Computer Science Vol. 2339, P. Syverson ed., Springer-Verlag, 2001.
-
(2001)
Financial Cryptography’01
, vol.2339
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
4
-
-
84937408891
-
GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks
-
Lecture Notes in Computer Science, M. Yung ed., Springer-Verlag
-
M. Bellare and A. Palacio. GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. Advances in Cryptology – CRYPTO’02, Lecture Notes in Computer Science Vol. 2442, M. Yung ed., Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology – CRYPTO’02
, vol.2442
-
-
Bellare, M.1
Palacio, A.2
-
7
-
-
0001604533
-
Blind signatures for untraceable payments
-
D. Chaum, R. Rivest and A. Sherman eds., Plenum Press
-
D. Chaum. Blind signatures for untraceable payments. Advances in Cryptology – CRYTPO 82Pro ceedings, D. Chaum, R. Rivest and A. Sherman eds., Plenum Press.
-
Advances in Cryptology – CRYTPO 82Pro Ceedings
-
-
Chaum, D.1
-
8
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser and S. Micali. How to construct random functions. Journal of the ACM, Vol. 33, No. 4, 1986, pp. 210–217.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
9
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
S. Goldwasser, S. Micali and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, Vol. 17, No. 2, April 1988, pp. 281–308.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
10
-
-
0345270373
-
A “paradoxical” identity-based signature scheme resulting from zero-knowledge
-
Lecture Notes in Computer Science, S. Goldwasser ed., Springer-Verlag
-
L. Guillou and J. J. Quisquater. A “paradoxical” identity-based signature scheme resulting from zero-knowledge. Advances in Cryptology – CRYPTO’88, Lecture Notes in Computer Science Vol. 403, S. Goldwasser ed., Springer-Verlag, 1988.
-
(1988)
Advances in Cryptology – CRYPTO’88
, vol.403
-
-
Guillou, L.1
Quisquater, J.J.2
-
11
-
-
84944905011
-
Homomorphic signature schemes
-
Lecture Notes in Computer Science, B. Preneel ed., Springer-Verlag
-
R. Johnson, D. Molnar, D. Song and D. Wagner. Homomorphic signature schemes. Topics in Cryptology – CT-RSA’02, Lecture Notes in Computer Science Vol. 2271, B. Preneel ed., Springer-Verlag, 2002.
-
(2002)
Topics in Cryptology – CT-RSA’02
, vol.2271
-
-
Johnson, R.1
Molnar, D.2
Song, D.3
Wagner, D.4
-
12
-
-
84944878224
-
Transitive signature schemes
-
Lecture Notes in Computer Science, B. Preneel ed., Springer-Verlag
-
S. Micali and R. Rivest. Transitive signature schemes. Topics in Cryptology – CT-RSA’02, Lecture Notes in Computer Science Vol. 2271, B. Preneel ed., Springer-Verlag, 2002.
-
(2002)
Topics in Cryptology – CT-RSA’02
, vol.2271
-
-
Micali, S.1
Rivest, R.2
-
13
-
-
0344839013
-
Improving the exact security of digital signature schemes
-
S. Micali and L. Reyzin. Improving the exact security of digital signature schemes. Journal of Cryptology, Vol. 15, Number 1, 2002, pp. 1–18.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.1
, pp. 1-18
-
-
Micali, S.1
Reyzin, L.2
-
14
-
-
33646041848
-
-
Slides from talk given at Cambridge University, October 17
-
R. Rivest. Two signature schemes. Slides from talk given at Cambridge University, October 17, 2000.
-
(2000)
Two Signature Schemes
-
-
Rivest, R.1
-
15
-
-
84969362298
-
-
http://theory.lcs.mit.edu/˜rivest/publications.html.
-
-
-
-
16
-
-
84949982830
-
Content Extraction Signatures
-
Lecture Notes in Computer Science, K. Kim ed., Springer-Verlag
-
R. Steinfeld, L. Bull and Y. Zheng. Content Extraction Signatures. Information Security and Cryptology – ICISC 2001, Lecture Notes in Computer Science Vol. 2288, K. Kim ed., Springer-Verlag, 2002.
-
(2002)
Information Security and Cryptology – ICISC 2001
, vol.2288
-
-
Steinfeld, R.1
Bull, L.2
Zheng, Y.3
|