메뉴 건너뛰기




Volumn 1189, Issue , 1997, Pages 119-129

Efficient and secure conference-key distribution

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 84978999296     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-62494-5_12     Document Type: Conference Paper
Times cited : (60)

References (18)
  • 5
  • 10
    • 0020880222 scopus 로고
    • Analysis of certain aspects of output feedback mode
    • D. Chaum, R.L. Rivest, and A.T. Sherman, Eds., Plenum Press N.Y
    • Jueneman, R.: Analysis of certain aspects of output feedback mode. In Advances in Cryptology. Proc. Crypto 82 (1983) D. Chaum, R. L. Rivest, and A. T. Sherman, Eds., Plenum Press N. Y., pp. 99-127.
    • (1983) Advances in Cryptology. Proc. Crypto 82 , pp. 99-127
    • Jueneman, R.1
  • 12
    • 84947597805 scopus 로고
    • Towards the equivalence of breaking the Diffie-Hellman protocol and computing the discrete logarithm
    • Y.G. Desmedt, Ed., Springer-Verlag
    • Maurer, U. M.: Towards the equivalence of breaking the Diffie-Hellman protocol and computing the discrete logarithm. In Advances in Cryptology-Crypto '94 (Lecture Notes in Computer Science 839) (1994) Y. G. Desmedt, Ed., Springer-Verlag, pp. 271-281.
    • (1994) Advances in Cryptology-Crypto '94 (Lecture Notes in Computer Science 839) , pp. 271-281
    • Maurer, U.M.1
  • 13
    • 0024139776 scopus 로고
    • A key distribution system equivalent to factoring
    • McCurley, K. S.: A key distribution system equivalent to factoring. Journal of Cryptology, 1(2): 95-105, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.2 , pp. 95-105
    • McCurley, K.S.1
  • 14
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest, R. L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21: 294-299, 1978.
    • (1978) Commun. ACM , vol.21 , pp. 294-299
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 15
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • Shannon, C. E.: Communication Theory of Secrecy Systems. Bell System Techn. Jour. 28: 656-715, 1949.
    • (1949) Bell System Techn. Jour , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 18
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • Wegman, M. N., Carter, L.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22: 265-279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.