scientific article; zbMATH DE number 177023
From MaRDI portal
Publication:4036859
Recommendations
- An interactive identification scheme based on discrete logarithms and factoring
- Breaking an ID-based encryption based on discrete logarithm and factorization problems
- New ID-based digital signature scheme on factoring and discrete logarithms
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
- On the security of a practical identification scheme
- On the security of a practical identification scheme
- scientific article; zbMATH DE number 1950355
- A new signature scheme based on factoring and discrete logarithms
- A new key authentication scheme based on discrete logarithms
Cited in
(12)- Short fail-stop signature scheme based on factorization and discrete logarithm assumptions
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Optimal security proofs for signatures from identification schemes
- iPIN and mTAN for secure eID applications
- Cascade ciphers: The importance of being first
- Efficient signature generation by smart cards
- scientific article; zbMATH DE number 4123668 (Why is no real title available?)
- Anamorphic signatures: secrecy from a dictator who only permits authentication!
- scientific article; zbMATH DE number 1186875 (Why is no real title available?)
- scientific article; zbMATH DE number 4191111 (Why is no real title available?)
- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices
- On the fly authentication and signature schemes based on groups of unknown order
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4036859)