-
3
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal: "A public-key cryptosystem and a signature scheme based on discrete logarithms", IEEE transactions of information theory, vol.IT-31, no.4, pp.469-472, 1985.
-
(1985)
IEEE transactions of information theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
4
-
-
0024135240
-
Zero-knowledge proofs of identity
-
U. Feige, A. Fiat and A. Shamir: "Zero-knowledge proofs of identity", Journal of cryptology, vol.1, pp.77-95, 1988.
-
(1988)
Journal of cryptology
, vol.1
, pp. 77-95
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
5
-
-
84974680547
-
ESIGN: An efficient digital signature implementation for smart cards
-
Springer-Verlag
-
A. Fujisaki, S. Miyaguchi and T. Okamoto: "ESIGN: an efficient digital signature implementation for smart cards", Advances in cryptology - Eurocrypt’91, Lecture Notes in Computer Science 547, Springer-Verlag, pp.446-457, 1992.
-
(1992)
Advances in cryptology - Eurocrypt’91, Lecture Notes in Computer Science 547
, pp. 446-457
-
-
Fujisaki, A.1
Miyaguchi, S.2
Okamoto, T.3
-
6
-
-
85043791322
-
An identity-based identification scheme based on discrete logarithms modulo a composite number
-
Springer-Verlag
-
M. Girault: "An identity-based identification scheme based on discrete logarithms modulo a composite number", Advances in cryptology - Eurocrypt’90, Lecture Notes in Computer Science 473, Springer-Verlag, pp.481-486, 1991.
-
(1991)
Advances in cryptology - Eurocrypt’90, Lecture Notes in Computer Science 473
, pp. 481-486
-
-
Girault, M.1
-
10
-
-
0024984432
-
The number field sieve
-
A. K. Lenstra, H. W. Lenstra Jr., M. S. Manasse and J. M. Pollard: "The number field sieve", Proceedings of ACM Annual Symposium on Theory of Computing, pp.564-572, 1990.
-
(1990)
Proceedings of ACM Annual Symposium on Theory of Computing
, pp. 564-572
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Manasse, M.S.3
Pollard, J.M.4
-
11
-
-
0001258323
-
Factoring integers with elliptic curves
-
H. W. Lenstra Jr.: "Factoring integers with elliptic curves", Annuals of Mathematics, vol.126, pp.649-673, 1987.
-
(1987)
Annuals of Mathematics
, vol.126
, pp. 649-673
-
-
Lenstra, H.W.1
-
12
-
-
0041863206
-
Can DSA be improved ?
-
D. Naccache, D. M’raihi, S. Vaudenay and D. Raphaeli: "Can DSA be improved ?", Advances in cryptology - Eurocrypt’94, Lecture Notes in Computer Science 950, 1995.
-
(1995)
Advances in cryptology - Eurocrypt’94, Lecture Notes in Computer Science 950
-
-
Naccache, D.1
M’raihi, D.2
Vaudenay, S.3
Raphaeli, D.4
-
13
-
-
0003508562
-
-
Federal Information Processing Standards
-
National Institute of Standards and Technology (NIST): "Digital signature standards (DSS)", Federal Information Processing Standards, 1991.
-
(1991)
Digital signature standards (DSS)
-
-
-
14
-
-
0003629991
-
-
Federal Information Processing Standards
-
National Institute of Standards and Technology (NIST): "Secure hash standards (SHS)", Federal Information Processing Standards, 1995.
-
(1995)
Secure hash standards (SHS)
-
-
-
15
-
-
2642556970
-
Proposal of Efficient Signature Schemes Based on Factoring
-
Japanese
-
T. Okamoto, M. Tada and A. Miyaji: "Proposal of Efficient Signature Schemes Based on Factoring" (in Japanese), Transactions of Information Processing Society of Japan, vol. 42, no. 8, pp.2123-2133, 2001.
-
(2001)
Transactions of Information Processing Society of Japan
, vol.42
, Issue.8
, pp. 2123-2133
-
-
Okamoto, T.1
Tada, M.2
Miyaji, A.3
-
17
-
-
84966238549
-
Monte Carlo methods for index computation mod p
-
J. Pollard: "Monte Carlo methods for index computation mod p", Mathematics of Computation, vol 32, pp.918-924, 1978.
-
(1978)
Mathematics of Computation
, vol.32
, pp. 918-924
-
-
Pollard, J.1
-
19
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Springer-Verlag
-
D. Pointcheval and J. Stern: "Security arguments for digital signatures and blind signatures", Journal of cryptology, vol.13, no.3, Springer-Verlag, pp.361-396, 2000.
-
(2000)
Journal of cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
23
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir and L. M. Adleman: "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, vol.21, no.2, pp.120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
24
-
-
12344258539
-
Efficient signature generation by smart cards
-
Springer-Verlag
-
C. P. Schnorr: "Efficient signature generation by smart cards", Journal of cryptology, vol.4, Springer-Verlag, pp.161-174, 1991.
-
(1991)
Journal of cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
25
-
-
0003320305
-
A cost-based security analysis of symmetric and asymmetric key length
-
Available from
-
R. D. Silverman: "A cost-based security analysis of symmetric and asymmetric key length", RSA Laboratories, CryptoBytes, Bulletins, no.13, 1999. Available from: http://www.rsasecurity.com/rsalabs/bulletins/bulletin13.html.
-
(1999)
RSA Laboratories, CryptoBytes, Bulletins
, Issue.13
-
-
Silverman, R.D.1
|