메뉴 건너뛰기




Volumn , Issue , 2005, Pages 93-99

Lightweight encryption for email

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC MAIL; PUBLIC KEY CRYPTOGRAPHY;

EID: 85093109817     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (14)
  • 4
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based Encryption from the Weil Pairing
    • Dan Boneh and Matt Franklin. Identity-based Encryption from the Weil Pairing. SIAM Journal of Computing, 32(3):586-615, 2003.
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, Dan1    Franklin, Matt2
  • 5
    • 84870707379 scopus 로고    scopus 로고
    • A pratical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Ronald Cramer and Victor Shoup. A pratical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In CRYPTO, volume 1642 of LNCS, pages 13-25, 1998.
    • (1998) CRYPTO, volume 1642 of LNCS , pp. 13-25
    • Cramer, Ronald1    Shoup, Victor2
  • 7
    • 85032883059 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • Taher El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In CRYPTO '84, pages 10-18, 1984.
    • (1984) CRYPTO '84 , pp. 10-18
    • Gamal, Taher El1
  • 10
    • 85093072462 scopus 로고    scopus 로고
    • IETF. S/MIME Working Group
    • IETF. S/MIME Working Group. http://www.imc.org/ietf-smime/index.html.
  • 11
    • 0017930809 scopus 로고
    • A method for obtaining dig. signatures and public-key cryptosystems
    • Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining dig. signatures and public-key cryptosystems. Com. of the ACM, 21,2:120-126, 1978.
    • (1978) Com. of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, Ronald L.1    Shamir, Adi2    Adleman, Leonard M.3
  • 12
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Adi Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO, volume 196, pages 47-53, 1984.
    • (1984) CRYPTO , vol.196 , pp. 47-53
    • Shamir, Adi1
  • 13
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption Without Random Oracles
    • Brent Waters. Efficient Identity-Based Encryption Without Random Oracles. In EUROCRYPT, volume 3494 of LNCS, pages 114-127, 2005.
    • (2005) EUROCRYPT, volume 3494 of LNCS , pp. 114-127
    • Waters, Brent1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.