1 |
A method for obtaining digital signatures and public-key cryptosystems
/
|
2 |
Infromation technology - Security techniques - Cryptographic techniques based on elliptic curves: Part 2 - Digital signatures
/
|
3 |
Infromation technology - Security techniques - Digital signature schemes giving message recovery - Part 3: Discrete logarithm based mechanisms (revision)
/
|
4 |
Digital Signature Standard
/
|
5 |
Self-certified public keys
/
|
6 |
Message recovery for signature schemes based on the discrete logarithm problem
/
|
7 |
On-line / off-line RSA-like
/
|
8 |
Infromation technology - Security techniques - Digital signature schemes giving message recovery - Part 3: Discrete logarithm based mechanisms
/
|
9 |
An identity-based signature from gap Diffie-Hellman groups
/
|
10 |
Infromation technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms (revision)
/
|
11 |
The exact security of digital signatures: How to sign with RSA and Rabin
/
|
12 |
Security analysis of a practical on the fly authentication and signature generation
/
|
13 |
Cryptographic authentication protocols for smart cards
/
DOI ScienceOn |
14 |
부가형 전자서명 방식 표준 - 제2부 : 인증서 기반 전자서명 알고리즘
/
|
15 |
A paradoxical identity-based signature scheme resulting from zero-knowledge
/
|
16 |
ESIGN, an efficient digital signature implementation for smart cards
/
|
17 |
Digital signatures and public-key functions as intractable as factorization
/
|
18 |
Infromation technology - Security techniques - Digital recovery - Part 2: Integer factorization based mechanisms (revision)
/
|
19 |
부가형 전자서명 방식 표준 - 제3부 : 타원곡선을 이용한 인증서 기반 전자서명 알고리즘
/
|
20 |
Efficient identity based signature schemes based on pairings
/
|
21 |
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memeory
/
|
22 |
Infromation technology - Security techniques - Digital signatures with appendix - Part 2: Identity-based mechanisms
/
|
23 |
Infromation technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms (revision)
/
|
24 |
Infromation technology - Security techniques - Cryptographic techniques based on elliptic curves: Part 4 - Digital signatures giving message recovery
/
|
25 |
Infromation technology - Security techniques - Digital signatures with appendix - Part 3: General
/
|
26 |
Infromation technology - Security techniques - Digital signatures with appendix - Part 2: Certificate-based mechanisms
/
|
27 |
A signature scheme with message recovery as secure as discrete logarithm
/
|
28 |
Another Countermeasure to Forgeries
/
|