메뉴 건너뛰기




Volumn 537 LNCS, Issue , 1991, Pages 437-455

How to time-stamp a digital document

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; RECORDS MANAGEMENT;

EID: 85028754690     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-38424-3_32     Document Type: Conference Paper
Times cited : (153)

References (22)
  • 1
    • 85030321900 scopus 로고
    • When, photographs lie
    • July 30
    • J. Alter. When, photographs lie. Newsweek, pp. 44-45, July 30, 1990.
    • (1990) Newsweek , pp. 44-45
    • Alter, J.1
  • 2
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • Nov
    • M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850-864, Nov. 1984.
    • (1984) SIAM Journal on Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 4
    • 85028868533 scopus 로고
    • Collision-free hash functions and public-key signature schemes
    • Lecture Notes in Computer Science, vol. 304, Springer-Verlag, Berlin
    • I. Damgård. Collision-free hash functions and public-key signature schemes. In Advances in Cryptology-Eurocrypt '87, pp. 203-217. Lecture Notes in Computer Science, vol. 304, Springer-Verlag, Berlin, 1988.
    • (1988) Advances in Cryptology-Eurocrypt '87 , pp. 203-217
    • Damgård, I.1
  • 5
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • (G. Brassard), Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • I. Damgård. A design principle for hash functions. In. Advances in Cryptology-Crypto '89 (ed. G. Brassard), pp. 416-427. Lecture Notes in Computer Science, vol. 435, Springer-Verlag, Berlin, 1990.
    • (1990) Advances in Cryptology-Crypto '89 , vol.435 , pp. 416-427
    • Damgård, I.1
  • 6
    • 85030325268 scopus 로고    scopus 로고
    • On the design of provably secure cryptographic hash functions
    • Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear
    • A. DeSantis and M. Yung. On the design of provably secure cryptographic hash functions. In Advances in Cryptology-Eurocrypt '90. Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear.
    • Advances in Cryptology-Eurocrypt '90
    • DeSantis, A.1    Yung, M.2
  • 9
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • April
    • S. Goldwasser and S. Micali. Probabilistic encryption. JCSS, 28:270-299, April 1984.
    • (1984) JCSS , vol.28 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 11
    • 84909328655 scopus 로고
    • Ask it no questions: The camera can lie
    • section 2, August 12
    • Andy Grundberg. Ask it no questions: The camera can lie. The New York Times, section 2, pp. 1, 29, August 12, 1990.
    • (1990) The New York Times
    • Grundberg, A.1
  • 12
    • 0024866111 scopus 로고
    • Pseudorandom generation from one-way functions
    • ACM, New York
    • R. Impagliazzo, L. Levin, and M. Luby. Pseudorandom generation from one-way functions. In Proc. 21st STOC, pp. 12-24. ACM, New York, 1989.
    • (1989) Proc. 21st STOC , pp. 12-24
    • Impagliazzo, R.1    Levin, L.2    Luby, M.3
  • 13
    • 0024770898 scopus 로고
    • One-way functions are essential for complexity-based cryptography
    • IEEE, New York
    • R. Impagliazzo and M. Luby. One-way functions are essential for complexity-based cryptography. In Proc. 30th FOCS, pp. 230-235. IEEE, New York, 1989.
    • (1989) Proc. 30th FOCS , pp. 230-235
    • Impagliazzo, R.1    Luby, M.2
  • 14
    • 0006900885 scopus 로고
    • American Chemical Society, Washington, B. C
    • H. M. Kanare. Writing the laboratory notebook, p. 117. American Chemical Society, Washington, B. C., 1985.
    • (1985) Writing the laboratory notebook , pp. 117
    • Kanare, H.M.1
  • 16
    • 84937461306 scopus 로고
    • One-way hash functions and DES
    • (G. Brassard), Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • R. C. Merkle. One-way hash functions and DES. In Advances in Cryptology-Crypto '89 (ed. G. Brassard), pp. 428-446. Lecture Notes in Computer Science, vol. 435, Springer-Verlag, Berlin, 1990.
    • (1990) Advances in Cryptology-Crypto '89 , vol.435 , pp. 428-446
    • Merkle, R.C.1
  • 17
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • ACM, New York
    • M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. In Proc. 21st STOC, pp. 33-43. ACM, New York, 1989.
    • (1989) Proc. 21st STOC , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 18
    • 0010277907 scopus 로고
    • Digitalized signatures
    • R. A. DeMillo et al., Academic Press
    • M. O. Rabin. Digitalized signatures. In Foundations of Secure Computation (ed. R. A. DeMillo et al.), pp. 155-168. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 155-168
    • Rabin, M.O.1
  • 20
    • 0025152622 scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • ACM, New York
    • J. Rompel. One-way functions are necessary and sufficient for secure signatures. In Proc. 22nd STOC, pp. 387-394. ACM, New York, 1990.
    • (1990) Proc. 22nd STOC , pp. 387-394
    • Rompel, J.1
  • 21
    • 84944486544 scopus 로고
    • Prediction and entropy of printed English
    • C. Shannon. Prediction and entropy of printed English. Bell System Technical Journal, vol. 30 pp. 50-64, 1951.
    • (1951) Bell System Technical Journal , vol.30 , pp. 50-64
    • Shannon, C.1
  • 22
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions
    • IEEE, New York
    • A. C. Yao. Theory and applications of trapdoor functions. In Proc. 23rd FOCS, pp. 80-91. IEEE, New York, 1982.
    • (1982) Proc. 23rd FOCS , pp. 80-91
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.