Incremental Cryptography: The Case of Hashing and Signing
暂无分享,去创建一个
[1] David Chaum,et al. Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer , 1991, CRYPTO.
[2] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[3] Claus-Peter Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.
[4] Ivan Damgård,et al. Collision Free Hash Functions and Public Key Signature Schemes , 1987, EUROCRYPT.
[5] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[6] Claus-Peter Schnorr. E cient Identi cation and Signatures for Smart-Cards , 1990, CRYPTO 1990.
[7] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[8] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[9] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[10] Silvio Micali,et al. On-Line/Off-Line Digital Schemes , 1989, CRYPTO.
[11] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[12] Stefan A. Brands,et al. An Efficient Off-line Electronic Cash System Based On The Representation Problem. , 1993 .
[13] J. Feigenbaum. Advances in cryptology--CRYPTO '91 : proceedings , 1992 .
[14] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[15] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[16] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[17] Matthijs J. Coster,et al. Addition Chain Heuristics , 1989, CRYPTO.
[18] S. Brands. An Efficient Off-line Electronic Cash System Based On The Representation Problem. , 1993 .
[19] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[20] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..