Non-interactive Cryptosystem for Entity Authentication
暂无分享,去创建一个
[1] Silvio Micali,et al. Non-Interactive Zero-Knowledge with Preprocessing , 1988, CRYPTO.
[2] Silvio Micali,et al. Non-Interactive Zero-Knowledge Proof Systems , 1987, CRYPTO.
[3] George Cybenko,et al. Mobile agents for mobile computing , 1996 .
[4] Giovanni Di Crescenzo,et al. Randomness-Efficient Non-Interactive Zero-Knowledge (Extended Abstract) , 1997, ICALP.
[5] S. Micali. Fair cryptosystems , 1994 .
[6] Ioannis Pitas,et al. Digital watermarking: An overview , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[7] S. Brands. Off-Line Cash Transfer by Smart Cards. , 1994 .
[8] Silvio Micali,et al. Non-Interactive Oblivious Transfer and Applications , 1989, CRYPTO.
[9] Whitfield Diffie. The first ten years of public-key cryptography , 1988 .
[10] Kazuo Ohta,et al. A Modification of the Fiat-Shamir Scheme , 1988, CRYPTO.
[11] Martín Abadi,et al. The Scope of a Logic of Authentication , 1989, Distributed Computing And Cryptography.
[12] Aaron Kershenbaum,et al. Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.
[13] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[14] Jean-Jacques Quisquater,et al. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.
[15] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[16] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[17] Amos Fiat,et al. Zero Knowledge Proofs of Identity , 1987, STOC.
[18] Gustavus J. Simmons,et al. A survey of information authentication , 1988, Proc. IEEE.
[19] Manuel Blum,et al. Non-interactive zero-knowledge and its applications , 1988, STOC '88.
[20] Claus-Peter Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.
[21] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[22] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[23] Ioannis Pitas,et al. Digital image watermarking: an overview , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[24] Stefan Brands,et al. Electronic cash on the Internet , 1995, Proceedings of the Symposium on Network and Distributed System Security.
[25] F.-P. Heider,et al. The secure distribution of digital contents , 1997, Proceedings 13th Annual Computer Security Applications Conference.
[26] Nasir D. Memon,et al. Protecting digital media content , 1998, CACM.
[27] Jean-Didier Legat,et al. Architecture of security management unit for safe hosting of multiple agents , 1999, Electronic Imaging.
[28] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[29] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[30] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .