메뉴 건너뛰기




Volumn 2247, Issue , 2001, Pages 275-286

Efficient “on the fly” signature schemes based on integer factoring

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 84974726301     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45311-3_26     Document Type: Conference Paper
Times cited : (7)

References (26)
  • 3
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal: "A public-key cryptosystem and a signature scheme based on discrete logarithms", IEEE transactions of information theory, vol.IT-31, no.4, pp.469-472, 1985.
    • (1985) IEEE transactions of information theory , vol.IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 6
    • 85043791322 scopus 로고
    • An identity-based identification scheme based on discrete logarithms modulo a composite number
    • Springer-Verlag
    • M. Girault: "An identity-based identification scheme based on discrete logarithms modulo a composite number", Advances in cryptology - Eurocrypt’90, Lecture Notes in Computer Science 473, Springer-Verlag, pp.481-486, 1991.
    • (1991) Advances in cryptology - Eurocrypt’90, Lecture Notes in Computer Science 473 , pp. 481-486
    • Girault, M.1
  • 11
    • 0001258323 scopus 로고
    • Factoring integers with elliptic curves
    • H. W. Lenstra Jr.: "Factoring integers with elliptic curves", Annuals of Mathematics, vol.126, pp.649-673, 1987.
    • (1987) Annuals of Mathematics , vol.126 , pp. 649-673
    • Lenstra, H.W.1
  • 13
    • 0003508562 scopus 로고
    • Federal Information Processing Standards
    • National Institute of Standards and Technology (NIST): "Digital signature standards (DSS)", Federal Information Processing Standards, 1991.
    • (1991) Digital signature standards (DSS)
  • 14
    • 0003629991 scopus 로고
    • Federal Information Processing Standards
    • National Institute of Standards and Technology (NIST): "Secure hash standards (SHS)", Federal Information Processing Standards, 1995.
    • (1995) Secure hash standards (SHS)
  • 17
    • 84966238549 scopus 로고
    • Monte Carlo methods for index computation mod p
    • J. Pollard: "Monte Carlo methods for index computation mod p", Mathematics of Computation, vol 32, pp.918-924, 1978.
    • (1978) Mathematics of Computation , vol.32 , pp. 918-924
    • Pollard, J.1
  • 19
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • Springer-Verlag
    • D. Pointcheval and J. Stern: "Security arguments for digital signatures and blind signatures", Journal of cryptology, vol.13, no.3, Springer-Verlag, pp.361-396, 2000.
    • (2000) Journal of cryptology , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 23
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir and L. M. Adleman: "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, vol.21, no.2, pp.120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 24
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Springer-Verlag
    • C. P. Schnorr: "Efficient signature generation by smart cards", Journal of cryptology, vol.4, Springer-Verlag, pp.161-174, 1991.
    • (1991) Journal of cryptology , vol.4 , pp. 161-174
    • Schnorr, C.P.1
  • 25
    • 0003320305 scopus 로고    scopus 로고
    • A cost-based security analysis of symmetric and asymmetric key length
    • Available from
    • R. D. Silverman: "A cost-based security analysis of symmetric and asymmetric key length", RSA Laboratories, CryptoBytes, Bulletins, no.13, 1999. Available from: http://www.rsasecurity.com/rsalabs/bulletins/bulletin13.html.
    • (1999) RSA Laboratories, CryptoBytes, Bulletins , Issue.13
    • Silverman, R.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.