-
1
-
-
85017093546
-
Authentication codes with multiple arbiters
-
C. G. Günther, editor, Springer-Verlag, May, Davos, Switzerland
-
E. F. Brickell and D. R. Stinson. Authentication codes with multiple arbiters. In C. G. Günther, editor, Advances in Cryptology, Proc. of Eurocrypt '88 (Lecture Notes in Computer Science 330), pp. 51-55. Springer-Verlag, May 1988. Davos, Switzerland.
-
(1988)
Advances in Cryptology, Proc. of Eurocrypt '88 (Lecture Notes in Computer Science 330)
, pp. 51-55
-
-
Brickell, E.F.1
Stinson, D.R.2
-
2
-
-
84946861053
-
Attacks on some RSA signatures
-
Springer-Verlag, New York, Santa Barbara, California, U. S.A., August 18-22, 1985
-
W. de Jonge and D. Chaum. Attacks on some RSA signatures. In Advances in Cryptology. Proc. of Crypto’85 (Lecture Notes in Computer Science 218), pp. 18-27. Springer-Verlag, New York, 1986. Santa Barbara, California, U. S.A., August 18-22, 1985.
-
(1986)
Advances in Cryptology. Proc. of Crypto’85 (Lecture Notes in Computer Science 218)
, pp. 18-27
-
-
de Jonge, W.1
Chaum, D.2
-
3
-
-
85012584879
-
Some variations on RSA signatures & their security
-
A. Odlyzko, editor, Springer-Verlag, Santa Barbara, California, U. S. A., August 11-15
-
W. de Jonge and D. Chaum. Some variations on RSA signatures & their security. In A. Odlyzko, editor, Advances in Cryptology, Proc. of Crypto '86 (Lecture Notes in Computer Science 263), pp. 49-59. Springer-Verlag, 1987. Santa Barbara, California, U. S. A., August 11-15.
-
(1987)
Advances in Cryptology, Proc. of Crypto '86 (Lecture Notes in Computer Science 263)
, pp. 49-59
-
-
de Jonge, W.1
Chaum, D.2
-
4
-
-
84976740532
-
Digital signatures with RSA and other public-key cryptosystems
-
D. E. R. Denning. Digital signatures with RSA and other public-key cryptosystems. Comm. ACM 27, pp. 388-392, 1984.
-
(1984)
Comm. ACM 27
, pp. 388-392
-
-
Denning, D.E.R.1
-
6
-
-
0017018484
-
New directions in cryptography
-
November
-
W. Diffie and M. E. Heilman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22(6), pp. 644-654, November 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Heilman, M.E.2
-
7
-
-
0016038540
-
Codes which detect deception
-
March
-
E. Gilbert, F. MacWilliams, and N. Sloane. Codes which detect deception. The BELL System Technical Journal, 53(3), pp. 405-424, March 1974.
-
(1974)
The BELL System Technical Journal
, vol.53
, Issue.3
, pp. 405-424
-
-
Gilbert, E.1
MacWilliams, F.2
Sloane, N.3
-
8
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. Siam J. Comput., 17(2), pp. 281-308, April 1988.
-
(1988)
Siam J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
9
-
-
0024770898
-
One-way functions are essential for complexity based cryptography
-
IEEE Computer Society Press, October 30-November 1, Research Triangle Park, NC, U. S.A
-
R. Impagliazzo and M. Luby. One-way functions are essential for complexity based cryptography. In 30th Annual Symp. on Foundations of Computer Science (FOCS), pp. 230-235. IEEE Computer Society Press, October 30-November 1, 1988. Research Triangle Park, NC, U. S.A.
-
(1988)
30th Annual Symp. on Foundations of Computer Science (FOCS)
, pp. 230-235
-
-
Impagliazzo, R.1
Luby, M.2
-
13
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
April
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21, pp. 294-299, April 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 294-299
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
15
-
-
84920719029
-
Message authentication with arbitration of transmitter/receiver disputes
-
D. Chaum and W. L. Price, editors, PP-151-165. Springer-Verlag, Berlin, 1988. Amsterdam, The Netherlands, April 13-15, full paper submitted to the Journal of Cryptology
-
G. J. Simmons. Message authentication with arbitration of transmitter/receiver disputes. In D. Chaum and W. L. Price, editors, Advances in Cryptology-Eurocrypt '87 (Lecture Notes in Computer Science 304), PP-151-165. Springer-Verlag, Berlin, 1988. Amsterdam, The Netherlands, April 13-15, 1987, full paper submitted to the Journal of Cryptology.
-
(1987)
Advances in Cryptology-Eurocrypt '87 (Lecture Notes in Computer Science 304)
-
-
Simmons, G.J.1
-
16
-
-
0024015453
-
A survey of information authentication
-
May
-
G. J. Simmons. A survey of information authentication. Proc. IEEE, 76(5), pp. 603-620, May 1988.
-
(1988)
Proc. IEEE
, vol.76
, Issue.5
, pp. 603-620
-
-
Simmons, G.J.1
-
17
-
-
33745715684
-
Robust shared secret schemes
-
G. J. Simmons. Robust shared secret schemes. Congressus Numerantium, 68, pp. 215-248, 1989.
-
(1989)
Congressus Numerantium
, vol.68
, pp. 215-248
-
-
Simmons, G.J.1
-
18
-
-
0025157340
-
A Cartesian product construction for unconditionally secure authentication codes that permit arbitration
-
G. J. Simmons. A Cartesian product construction for unconditionally secure authentication codes that permit arbitration. Journal of Cryptology, 2(2), pp. 77-104, 1990.
-
(1990)
Journal of Cryptology
, vol.2
, Issue.2
, pp. 77-104
-
-
Simmons, G.J.1
-
19
-
-
0019572642
-
New hash fuctions and their use in authentication and set equality
-
M. N. Wegman and J. L. Carter. New hash fuctions and their use in authentication and set equality. Journal of Computer and System Sciences, 22, pp. 265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|