메뉴 건너뛰기




Volumn 576 LNCS, Issue , 1992, Pages 252-266

New public-key schemes based on elliptic curves over the ring Zn

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; FUNCTIONS; PUBLIC KEY CRYPTOGRAPHY;

EID: 85029478766     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46766-1_20     Document Type: Conference Paper
Times cited : (120)

References (25)
  • 1
    • 84966257177 scopus 로고
    • On taking roots in finite fields
    • 1977
    • L. Adleman, K. Manders, and G. Miller, “On taking roots in finite fields”, 20th FOCS, Vol. 20, 1977, pp. 175-178 (1977).
    • (1977) 20th FOCS , vol.20 , pp. 175-178
    • Adleman, L.1    Manders, K.2    Miller, G.3
  • 2
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum, “Blind signatures for untraceable payments”, Proc. of Crypto’82, pp. 199-203 (1982).
    • (1982) Proc. of Crypto’82 , pp. 199-203
    • Chaum, D.1
  • 4
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on the discrete logarithm
    • T. El-Gamal, “A public key cryptosystem and a signature scheme based on the discrete logarithm”, IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472 (1985).
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • El-Gamal, T.1
  • 6
    • 85034631664 scopus 로고
    • On using RSA with low exponent in a public key network
    • J. Hastad, “On using RSA with low exponent in a public key network”, Proc. of Crypto’85, pp. 403-408 (1985).
    • (1985) Proc. of Crypto’85 , pp. 403-408
    • Hastad, J.1
  • 7
    • 84946861053 scopus 로고
    • Attacks on some RSA signatures
    • W. Jonge and D. Chaum, " Attacks on some RSA signatures”, Proc. of Crypto’85, pp. 18-27 (1985).
    • (1985) Proc. of Crypto’85 , pp. 18-27
    • Jonge, W.1    Chaum, D.2
  • 8
    • 85034862443 scopus 로고
    • A pseudo-random bit generator based on elliptic logarithms
    • B.S. Kaliski, “A pseudo-random bit generator based on elliptic logarithms”, Proc. of Crypto’86, pp. 84-103 (1987).
    • (1987) Proc. of Crypto’86 , pp. 84-103
    • Kaliski, B.S.1
  • 10
    • 1642624853 scopus 로고
    • A Master Key for the RSA public-key cryptosystem
    • K. Koyama, “A Master Key for the RSA public-key cryptosystem”, I.E.C.E. Trans.(D), J-65, 2, pp. 163-170 (1982).
    • (1982) I.E.C.E. Trans.(D) , vol.J-65 , Issue.2 , pp. 163-170
    • Koyama, K.1
  • 11
    • 0009354344 scopus 로고
    • Stuttgart: Teubner, and New York: John Wiley & Sons
    • E. Kranakis, Primality and Cryptography, Stuttgart: Teubner, and New York: John Wiley & Sons, (1986).
    • (1986) Primality and Cryptography
    • Kranakis, E.1
  • 14
    • 0001258323 scopus 로고
    • Factoring integers with elliptic curves
    • H.W. Lenstra, “Factoring integers with elliptic curves”, Annals of Mathematics, Vol. 126, pp. 649-673 (1987).
    • (1987) Annals of Mathematics , vol.126 , pp. 649-673
    • Lenstra, H.W.1
  • 15
    • 85014015679 scopus 로고
    • Fast generation of RSA-moduli with almost maximal diversity
    • U.M. Maurer, “Fast generation of RSA-moduli with almost maximal diversity”, Proc. of EUROCRYPT’89, pp. 636-647 (1990).
    • (1990) Proc. of EUROCRYPT’89 , pp. 636-647
    • Maurer, U.M.1
  • 16
  • 17
    • 85029527374 scopus 로고
    • Cryptography - fundamentals and applications (Copies of transparencies)
    • Zurich, Switzerland
    • J.L. Massey, “Cryptography - fundamentals and applications (Copies of transparencies)", Advanced Technology Seminars, Zurich, Switzerland, (1988).
    • (1988) Advanced Technology Seminars
    • Massey, J.L.1
  • 18
    • 0017217375 scopus 로고
    • Riemann’s hypothesis and tests for primality
    • G.L. Miller, “Riemann’s hypothesis and tests for primality”, J. Comput. System Sci. Vol. 13, pp. 300-317, (1976).
    • (1976) J. Comput. System Sci , vol.13 , pp. 300-317
    • Miller, G.L.1
  • 19
    • 85030330304 scopus 로고
    • Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field
    • A.J. Menezes, T. Okamoto, S.A. Vanstone, “Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field”, Proc. of STOC’91, pp. 80-89 (1991).
    • (1991) Proc. of STOC’91 , pp. 80-89
    • Menezes, A.J.1    Okamoto, T.2    Vanstone, S.A.3
  • 20
    • 33845432604 scopus 로고
    • Probabilistic algorithm for testing primality
    • M.O. Rabin, “Probabilistic algorithm for testing primality”, Journal on Number Theory, Vol. 12, pp. 128-138 (1980).
    • (1980) Journal on Number Theory , vol.12 , pp. 128-138
    • Rabin, M.O.1
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Vol. 21, No. 2, pp. 120-126 (1978).
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 22
    • 84966233278 scopus 로고
    • Elliptic curves over finite fields and the computation of square roots mod p
    • R. Schoof, “Elliptic curves over finite fields and the computation of square roots mod p”, Mathematics of Computation, Vol. 44, No. 170, pp. 483-494 (1985).
    • (1985) Mathematics of Computation , vol.44 , Issue.170 , pp. 483-494
    • Schoof, R.1
  • 24
    • 84950896696 scopus 로고
    • Preliminary comments on the M.I.T. public key cryptosystem
    • G. Simmons and M. Norris, “Preliminary comments on the M.I.T. public key cryptosystem”, Cryptologia, Vol. 1, No. 4, pp. 406-414 (1977).
    • (1977) Cryptologia , vol.1 , Issue.4 , pp. 406-414
    • Simmons, G.1    Norris, M.2
  • 25
    • 0000585372 scopus 로고
    • Computational problems associated with Racah algebra
    • J. Stein, “Computational problems associated with Racah algebra”, J. Comp. Phys., Vol. 1, pp. 397-405 (1961).
    • (1961) J. Comp. Phys , vol.1 , pp. 397-405
    • Stein, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.