메뉴 건너뛰기




Volumn 453 LNCS, Issue , 1990, Pages 265-272

A (non-Practical) three-pass identification protocol using coding theory

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING;

EID: 85015223738     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0030367     Document Type: Conference Paper
Times cited : (17)

References (9)
  • 3
    • 33746337429 scopus 로고    scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • A. Fiat and A. Shamir, “How to prove yourself: Practical solutions to identification and signature problems”, Proc. of CRYPTO ‘86.
    • Proc. of CRYPTO ‘86
    • Fiat, A.1    Shamir, A.2
  • 5
    • 85032862747 scopus 로고
    • Un algorithme dauthentification sans transfert d’information”
    • Toulon, France
    • S. Harari, “Un algorithme d’authentification sans transfert d’information”, Proc. of Trois journées sur le codage, Toulon, France, 1988.
    • (1988) Proc. Of Trois journées Sur Le Codage
    • Harari, S.1
  • 8
    • 85031935843 scopus 로고    scopus 로고
    • An alternative to the Fiat-Shamir protocol
    • to appear
    • J. Stern, “An alternative to the Fiat-Shamir protocol”, EUROCRYPT’89, Proc. to appear.
    • EUROCRYPT’89, Proc
    • Stern, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.