Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation
暂无分享,去创建一个
[1] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[2] Ivan Damgård,et al. Secure Signature Schemes Based on Interactive Protocols See Back Inner Page for a List of Recent Publications in the Brics Report Series. Copies May Be Obtained by Contacting: Secure Signature Schemes Based on Interactive Protocols , 1995 .
[3] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[4] Jean-Jacques Quisquater,et al. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.
[5] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[6] Amos Fiat,et al. Zero-knowledge proofs of identity , 1988, Journal of Cryptology.
[7] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[8] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[9] Mihir Bellare,et al. On Defining Proofs of Knowledge , 1992, CRYPTO.
[10] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[11] Martín Abadi,et al. On Generating Solved Instances of Computational Problems , 1988, CRYPTO.
[12] M. Bellare,et al. On Deening Proofs of Knowledge , 1992 .
[13] Adi Shamir,et al. Witness indistinguishable and witness hiding protocols , 1990, STOC '90.
[14] Adi Shamir,et al. Zero Knowledge Proofs of Knowledge in Two Rounds , 1989, CRYPTO.
[15] László Babai,et al. Arthur-Merlin Games: A Randomized Proof System, and a Hierarchy of Complexity Classes , 1988, J. Comput. Syst. Sci..