-
1
-
-
79958074367
-
-
In Michael Wiener, editor, Springer-Verlag, 15-19 August, Revised version is available from
-
Mihir Bellare and Sara Miner. A forward-secure digital signature scheme. In Michael Wiener, editor, Advances in Cryptology—CRYPTO’99, volume 1666 of Lecture Notes in Computer Science. Springer-Verlag, 15-19 August 1999. Revised version is available from http://www.cs.ucsd.edu/mihir/.
-
Advances in Cryptology—CRYPTO’99
-
-
Bellare, M.1
Miner, S.2
-
2
-
-
0027726717
-
Random oracles are practical:A paradigm for designing efficient protocols
-
November, Revised version appears in
-
Mihir Bellare and Phillip Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communication Security, November 1993. Revised version appears in http://www-cse.ucsd.edu/users/mihir/papers/crypto-papers.html
-
(1993)
Procee
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84961296798
-
-
Springer-Verlag
-
I. B. Damgard, editor. Advances in Cryptology—EUROCRYPT 90, volume 473 of Lecture Notes in Computer Science. Springer-Verlag, 1991, 21-24 May 1990.
-
-
-
Damgard, I.B.1
-
5
-
-
0024135240
-
Zero-knowledge proofs of identity
-
Uriel Feige, Amos Fiat, and Adi Shamir. Zero-knowledge proofs of identity. Journal of Cryptology, 1(2):77-94, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
7
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, April 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
8
-
-
84969346237
-
-
Oded Goldreich. Two remarks concerning the Goldwasser-Micali-Rivest signature scheme. In Odlyzko [Odl86], pages 104-110.
-
-
-
Goldreich, O.1
-
13
-
-
33746441852
-
-
Technical Report MIT/LCS/TM-501, Massachusetts Institute of Technology, Cambridge, MA, March
-
Silvio Micali. A secure and efficient digital signature algorithm. Technical Report MIT/LCS/TM-501, Massachusetts Institute of Technology, Cambridge, MA, March 1994.
-
(1994)
A Secure and Efficient Digital Signature Algorithm
-
-
Micali, S.1
-
14
-
-
85031775795
-
-
Silvio Micali and Adi Shamir. An improvement of the Fiat-Shamir identification and signature scheme. In Goldwasser [Gol88], pages 244-247.
-
-
-
Micali, S.1
Shamir, A.2
-
16
-
-
84875762817
-
Provably secure and practical identification schemes and corresponding signature schemes
-
In Ernest F. Brickell, editor, volume 740 of Lecture Notes in Computer Science, Springer-Verlag, 16-20 August 1992
-
Tatsuaki Okamoto. Provably secure and practical identification schemes and corresponding signature schemes. In Ernest F. Brickell, editor, Advances in Cryptology—CRYPTO’92, volume 740 of Lecture Notes in Computer Science, pages 31-53. Springer-Verlag, 1993, 16-20 August 1992.
-
(1993)
Advances in Cryptology—CRYPTO’92
, pp. 31-53
-
-
Okamoto, T.1
-
17
-
-
84961327170
-
-
Kazuo Ohta and Tatsuaki Okamoto. A modification of the Fiat-Shamir scheme. In Goldwasser [Gol88], pages 232-243.
-
-
-
Ohta, K.1
Okamoto, T.2
-
18
-
-
84957705622
-
On concrete security treatment of signatures derived from identification
-
Kazuo Ohta and Tatsuaki Okamoto. On concrete security treatment of signatures derived from identification. In Hugo Krawczyk, editor, Advances in Cryptology—CRYPTO’98, volume 1462 of Lecture Notes in Computer Science, pages 354-369. Springer-Verlag, 23-27 August 1998.
-
(1998)
Advances in Cryptology—CRYPTO’98
, pp. 354-369
-
-
Ohta, K.1
Okamoto, T.2
-
19
-
-
33745972475
-
-
H. Ong and C. P. Schnorr. Fast signature generation with a Fiat Shamir-like scheme. In Damgard [Dam90], pages 432-440.
-
-
-
Ong, H.1
Schnorr, C.P.2
-
20
-
-
84961294188
-
-
David Pointcheval and Jacques Stern. Security proofs for signature schemes. In Maurer [Mau96], pages 387-398.
-
-
-
Pointcheval, D.1
Stern, J.2
-
22
-
-
85032873931
-
-
C. P. Schnorr. Efficient identification and signatures for smart cards. In Quisquater and Vandewalle [QV89], pages 688-689.
-
-
-
Schnorr, C.P.1
-
23
-
-
84955587394
-
Security of 2*-root identification and signatures
-
In Neal Koblitz, editor, volume 1109 of Lecture Notes in Computer Science, Springer-Verlag, 18-22 August 1996
-
C. P. Schnorr. Security of 2*-root identification and signatures. In Neal Koblitz, editor, Advances in Cryptology—CRYPTO’96, volume 1109 of Lecture Notes in Computer Science, pages 143-156. Springer-Verlag, 18-22 August 1996.
-
volume 1109 of Lecture Notes in Computer Science
, pp. 143-156
-
-
Schnorr, C.P.1
-
24
-
-
84961304830
-
-
Victor Shoup. On the security of a practical identification scheme. In Maurer [Mau96], pages 344-353.
-
-
-
Shoup, V.1
-
25
-
-
0019080452
-
A modification of the RSA public-key encryption procedure
-
November
-
Hugh C. Williams. A modification of the RSA public-key encryption procedure. IEEE Transactions on Information Theory, IT-26(6):726-729, November 1980.
-
(1980)
IEEE Transactions on Information Theory
, vol.26
, Issue.6
, pp. 726-729
-
-
Williams, H.C.1
|