메뉴 건너뛰기




Volumn 304 LNCS, Issue , 1988, Pages 203-216

Collision free hash functions and public key signature schemes

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; HASH FUNCTIONS;

EID: 85028868533     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-39118-5_19     Document Type: Conference Paper
Times cited : (183)

References (15)
  • 1
    • 85027137608 scopus 로고    scopus 로고
    • Non transitive transfer of confidence: A perfect zero-knowledge interactive protocol for SAT and beyond
    • Brassard and Crepeau: Non transitive transfer of confidence: a perfect zero-knowledge interactive protocol for SAT and beyond. Proc. of FOCS 86.
    • Proc. Of FOCS , vol.86
    • Brassard1    Crepeau2
  • 3
    • 84976740532 scopus 로고
    • Digital signatures with RSA and other public key cryptosystems
    • Denning: Digital signatures with RSA and other public key cryptosystems. CACM, v.27, nr 4, 1984, pp. 388-392.
    • (1984) CACM , vol.27 , Issue.4 , pp. 388-392
    • Denning1
  • 4
    • 0021555016 scopus 로고
    • A “paradoxical” solution to the signature problem
    • Goldwasser, Micali and Rivest: A “paradoxical” solution to the signature problem. Proc. of 25th FOCS, 1984, pp. 441-448.
    • (1984) Proc. Of 25Th FOCS , pp. 441-448
    • Goldwasser1    Micali2    Rivest3
  • 6
    • 0019095611 scopus 로고
    • The application of digital signatures based on public key cryptosystems. Proc. Of 5th
    • Davis and Price: The application of digital signatures based on public key cryptosystems. Proc. of 5th Int. CompCom, 1980, pp.525-530.
    • (1980) Int. Compcom , pp. 525-530
    • Davis1    Price2
  • 7
    • 33646845233 scopus 로고    scopus 로고
    • Producing a one-way hash function from DES
    • Winternitz: Producing a one-way hash function from DES. Proc. of Crypto 83, pp. 203-208.
    • Proc. Of Crypto , vol.83 , pp. 203-208
    • Winternitz1
  • 9
    • 85034808097 scopus 로고    scopus 로고
    • Lentras factoring method based on elliptic curves
    • Stephens: Lentras factoring method based on elliptic curves. Proc. of Crypto 85.
    • Proc. Of Crypto
    • Stephens1
  • 10
    • 85034843911 scopus 로고
    • New hash functions
    • Wegman and Carter: New hash functions. JCSI, v.22, 1981.
    • (1981) JCSI , Issue.22
    • Wegman1    Carter2
  • 12
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudorandom bits
    • Blum and F. Micali: How to generate cryptographically strong sequences of pseudorandom bits. SIAM J. of Computing, v.13, 1984.
    • (1984) SIAM J. Of Computing , vol.13
    • Blummicali, F.1
  • 13
    • 84955562452 scopus 로고    scopus 로고
    • Two remarks concerning the GMR-signature scheme
    • Goldreich: Two remarks concerning the GMR-signature scheme. Proc. of Crypto 86.
    • Proc. Of Crypto
    • Goldreich1
  • 15
    • 85034816012 scopus 로고    scopus 로고
    • private communication
    • Ben den Boer: private communication.
    • Ben den Boer1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.