Online/offline signature based on UOV in wireless sensor networks
暂无分享,去创建一个
Daojing He | Shaohua Tang | Yang Tan | Jiahui Chen | Daojing He | Shaohua Tang | Jiahui Chen | Yang Tan
[1] Chen-Mou Cheng,et al. New Differential-Algebraic Attacks and Reparametrization of Rainbow , 2008, ACNS.
[2] Louis Goubin,et al. Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.
[3] Markus Rückert,et al. Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles , 2010, PQCrypto.
[4] Yi Mu,et al. Efficient Generic On-Line/Off-Line Signatures Without Key Exposure , 2007, ACNS.
[5] Jean-Charles Faugère,et al. On the Security of UOV , 2008, IACR Cryptol. ePrint Arch..
[6] Jianying Zhou,et al. Wireless Sensor Network Security , 2008 .
[7] Rei-Heng Cheng,et al. Enhancing Network Availability by Tolerance Control in Multi-Sink Wireless Sensor Network , 2010, 2010 2nd International Conference on Information Technology Convergence and Services.
[8] David E. Culler,et al. TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.
[9] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[10] Liusheng Huang,et al. A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model , 2012, Int. J. Netw. Secur..
[11] Lei Hu,et al. Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme , 2011, ISPEC.
[12] Tsuyoshi Takagi,et al. Efficient Variant of Rainbow without Triangular Matrix Representation , 2014, ICT-EurAsia.
[13] Stanislav Bulygin,et al. CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key , 2010, INDOCRYPT.
[14] Kaoru Kurosawa,et al. New Online/Offline Signature Schemes Without Random Oracles , 2006, Public Key Cryptography.
[15] John J. Cannon,et al. The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..
[16] Joonsang Baek,et al. Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.
[17] Stanislav Bulygin,et al. Linear Recurring Sequences for the UOV Key Generation , 2011, Public Key Cryptography.
[18] Dae-Wha Seo,et al. Intrusion detection based on traffic analysis in wireless sensor networks , 2010, The 19th Annual Wireless and Optical Communications Conference (WOCC 2010).
[19] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[20] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[21] Hideki Imai,et al. Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.
[22] R. B. Patel,et al. Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks , 2011, Int. J. Inf. Technol. Commun. Convergence.
[23] Ariel Shamir,et al. Cryptanalysis of the oil and vinegar signature scheme , 1998 .
[24] Marc Joye,et al. An Efficient On-Line/Off-Line Signature Scheme without Random Oracles , 2008, CANS.
[25] Tsuyoshi Takagi,et al. Efficient variant of Rainbow using sparse secret keys , 2014, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[26] Tim Güneysu,et al. Embedded Syndrome-Based Hashing , 2012, INDOCRYPT.
[27] Silvio Micali,et al. On-Line/Off-Line Digital Schemes , 1989, CRYPTO.
[28] Praveen Budhwar,et al. TinyOS: An Operating System for Wireless Sensor Networks , 2015 .
[29] Yael Tauman Kalai,et al. Improved Online/Offline Signature Schemes , 2001, CRYPTO.
[30] Jintai Ding,et al. Rainbow, a New Multivariable Polynomial Signature Scheme , 2005, ACNS.
[31] Anup Kumar,et al. Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks , 2011, Int. J. Inf. Technol. Commun. Convergence.
[32] Albrecht Petzoldt,et al. Small private keys for systems of multivariate quadratic equations using symmetric cryptography , 2012 .
[33] Adi Shamir,et al. Cryptanalysis of the Oil & Vinegar Signature Scheme , 1998, CRYPTO.
[34] Jean Charles Faugère,et al. A new efficient algorithm for computing Gröbner bases without reduction to zero (F5) , 2002, ISSAC '02.