-
1
-
-
84957668600
-
Quantum cryptanalysis of hidden linear functions
-
D. Boneh and R. J. Lipton, “Quantum cryptanalysis of hidden linear functions,” Proc. of CRYPTO’95, LNCS 963, Springer-Verlag, pp.424-437, 1995.
-
(1995)
Proc. Of CRYPTO’95, LNCS 963, Springer-Verlag
, pp. 424-437
-
-
Boneh, D.1
Lipton, R.J.2
-
2
-
-
85017093546
-
Authentication codes with multiple arbiters
-
E. F. Brickell and D. R. Stinson, “Authentication codes with multiple arbiters,” Proc. of Eurocrypt’88, LNCS 330, Springer-Verlag, pp.51-55, 1988.
-
(1988)
Proc. Of Eurocrypt’88, LNCS 330, Springer-Verlag
, pp. 51-55
-
-
Brickell, E.F.1
Stinson, D.R.2
-
3
-
-
77956089601
-
Factorization of a 512-bit RSA modulus
-
S. Cavallar, B. Dodson, A. K. Lenstra, et al., “Factorization of a 512-bit RSA modulus,” Proc. of Eurocrypt’00, LNCS 1807, Springer-Verlag, pp.1-18, 2000.
-
(2000)
Proc. Of Eurocrypt’00, LNCS 1807, Springer-Verlag
, pp. 1-18
-
-
Cavallar, S.1
Dodson, B.2
Lenstra, A.K.3
-
4
-
-
84988897099
-
Unconditionally secure digital signatures
-
D. Chaum and S. Roijakkers, “Unconditionally secure digital signatures,” Proc. Of CRYPTO’90, LNCS 537, Springer-Verlag, pp.206-215, 1990.
-
(1990)
Proc. Of CRYPTO’90, LNCS 537, Springer-Verlag
, pp. 206-215
-
-
Chaum, D.1
Roijakkers, S.2
-
5
-
-
85027188625
-
Arbitrated unconditionally secure authentication can be unconditionally protected against arbiters attack,”
-
Y. Desmedt and M. Yung, “Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter’s attack,” Proc. of CRYPTO’90, LNCS 537, Springer-Verlag, pp.177-188, 1990.
-
(1990)
Proc. Of CRYPTO’90, LNCS 537, Springer-Verlag
, pp. 177-188
-
-
Desmedt, Y.1
Yung, M.2
-
6
-
-
0026992399
-
Multi-receiver/Multi-sender network security: Efficient authenticated multicast/feedback
-
Y. Desmedt, Y. Frankel and M. Yung, “Multi-receiver/Multi-sender network security: efficient authenticated multicast/feedback,” Proc. of IEEE Infocom’92, pp.2045-2054, 1992.
-
(1992)
Proc. Of IEEE Infocom’92
, pp. 2045-2054
-
-
Desmedt, Y.1
Frankel, Y.2
Yung, M.3
-
7
-
-
0016038540
-
Codes which detect deception
-
E. N. Gilbert, F. J. MacWilliams and N. J. A. Sloane, “Codes which detect deception,” Bell System Technical Journal, 53, pp.405-425, 1974.
-
(1974)
Bell System Technical Journal
, vol.53
, pp. 405-425
-
-
Gilbert, E.N.1
Macwilliams, F.J.2
Sloane, N.J.3
-
8
-
-
0001925043
-
Further results on asymmetric authentication schemes
-
T. Johansson, “Further results on asymmetric authentication schemes,” Information and Computation, 151, pp.100-133, 1999.
-
(1999)
Information and Computation
, vol.151
, pp. 100-133
-
-
Johansson, T.1
-
9
-
-
84937409531
-
Unconditionally secure digital signature schemes admitting transferability
-
G. Hanaoka, J. Shikata, Y. Zheng and H. Imai, “Unconditionally secure digital signature schemes admitting transferability,” Proc. of Asiacrypt2000, LNCS 1976, Springer-Verlag, pp.130-142, 2000.
-
(2000)
Proc. Of Asiacrypt2000, LNCS 1976, Springer-Verlag
, pp. 130-142
-
-
Hanaoka, G.1
Shikata, J.2
Zheng, Y.3
Imai, H.4
-
10
-
-
0347188281
-
New bound on authentication code with arbitration
-
K. Kurosawa, “New bound on authentication code with arbitration,” Proc. Of CRYPTO’94, LNCS 839, Springer-Verlag, pp.140-149, 1994.
-
(1994)
Proc. Of CRYPTO’94, LNCS 839, Springer-Verlag
, pp. 140-149
-
-
Kurosawa, K.1
-
12
-
-
0008284565
-
Fail-stop signatures
-
T. P. Pedersen and B. Pfitzmann, “Fail-stop signatures,” SIAM J. on Comp., 26, no.2, pp.291-330, 1997.
-
(1997)
SIAM J. On Comp
, vol.26
, Issue.2
, pp. 291-330
-
-
Pedersen, T.P.1
Pfitzmann, B.2
-
13
-
-
84957715332
-
New results on multi-receiver authentication codes
-
R. Safavi-Naini and H. Wang, “New results on multi-receiver authentication codes,” Proc. of Eurocrypt’98, LNCS 1403, pp.527-541, 1998.
-
(1998)
Proc. Of Eurocrypt’98, LNCS
, vol.1403
, pp. 527-541
-
-
Safavi-Naini, R.1
Wang, H.2
-
14
-
-
84956852177
-
-
Proc. of Asiacrypt’99, LNCS 1716, Springer-Verlag
-
R. Safavi-Naini and H. Wang, “Broadcast authentication in group communication,” Proc. of Asiacrypt’99, LNCS 1716, Springer-Verlag, pp.399-411, 1999.
-
(1999)
Broadcast Authentication in Group Communication
, pp. 399-411
-
-
Safavi-Naini, R.1
Wang, H.2
-
15
-
-
0001531989
-
Multireceiver authentication codes: Models, bounds, constructions and extensions
-
R. Safavi-Naini and H. Wang, “Multireceiver authentication codes: models, bounds, constructions and extensions,” Information and Computation, 151, pp.148-172, 1999.
-
(1999)
Information and Computation
, vol.151
, pp. 148-172
-
-
Safavi-Naini, R.1
Wang, H.2
-
16
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM J. Comp., 26, no.5, pp.1484-1509, 1997.
-
(1997)
SIAM J. Comp
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
17
-
-
84983269168
-
Authentication theory/coding theory
-
G. J. Simmons, “Authentication theory/coding theory,” Proc. of CRYPTO’84, LNCS 196, Springer-Verlag, pp.411-431, 1984.
-
(1984)
Proc. Of CRYPTO’84, LNCS 196, Springer-Verlag
, pp. 411-431
-
-
Simmons, G.J.1
-
18
-
-
84920719029
-
Message authentication with arbitration of transmitter/receiver disputes
-
G. J. Simmons, “Message authentication with arbitration of transmitter/receiver disputes,” Proc. of Eurocrypt’87, Springer-Verlag, pp.151-165, 1987.
-
(1987)
Proc. Of Eurocrypt’87, Springer-Verlag
, pp. 151-165
-
-
Simmons, G.J.1
-
19
-
-
0025157340
-
A Cartesian construction for unconditionally secure authentication codes that permit arbitration
-
G. J. Simmons, “A Cartesian construction for unconditionally secure authentication codes that permit arbitration,” Journal of Cryptology, 2, pp.77-104, 1990.
-
(1990)
Journal of Cryptology
, vol.2
, pp. 77-104
-
-
Simmons, G.J.1
|