메뉴 건너뛰기




Volumn 330 LNCS, Issue , 1988, Pages 123-128

A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; ECONOMIC AND SOCIAL EFFECTS;

EID: 84959165880     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45961-8_11     Document Type: Conference Paper
Times cited : (359)

References (5)
  • 2
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems. Springer-Verlag, Lecture notes in computer science, N° 263, Advances in cryptology
    • Amos Fiat and Adi Shamir, How to prove yourself: practical solutions to identification and signature problems. Springer-Verlag, Lecture notes in computer science, N° 263, Advances in cryptology, Proceedings of CRYPTO’86, pp. 186-194, 1987.
    • (1987) Proceedings of CRYPTO’86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 5
    • 85020598353 scopus 로고
    • Springer-Verlag, Lecture notes in computer science, N° 196, Advances in cryptology
    • Proceedings of CRYPTO’84
    • Adi Shamir, Identity-based cryptosystems and signatures schemes, Springer-Verlag, Lecture notes in computer science, N° 196, Advances in cryptology, Proceedings of CRYPTO’84, pp. 47-53, 1985.
    • (1985) Identity-Based Cryptosystems and Signatures Schemes , pp. 47-53
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.