A user authentication scheme for shared data based on a trap-door one-way function
- 13 April 1981
- journal article
- Published by Elsevier in Information Processing Letters
- Vol. 12 (2) , 63-67
- https://doi.org/10.1016/0020-0190(81)90003-x
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Critical remarks on “Critical Remarks on Some Public-Key Cryptosystems” by T. HerlestamBIT Numerical Mathematics, 1979
- Rivest-Shamir-Adleman public key cryptosystems do not always conceal messagesComputers & Mathematics with Applications, 1979
- Critical remarks on some public-key cryptosystemsBIT Numerical Mathematics, 1978
- SECURITY OF NUMBER THEORETIC PUBLIC KEY CRYPTOSYSTEMS AGAINST RANDOM ATTACK, ICryptologia, 1978
- Hiding information and signatures in trapdoor knapsacksIEEE Transactions on Information Theory, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- REMARKS ON A PROPOSED CRYPTANALYTIC ATTACK ON THE M.I.T. PUBLIC-KEY CRYPTOSYSTEMCryptologia, 1978
- PRELIMINARY COMMENTS ON THE M.I.T. PUBLIC-KEY CRYPTOSYSTEMCryptologia, 1977
- The protection of information in computer systemsProceedings of the IEEE, 1975
- A user authentication scheme not requiring secrecy in the computerCommunications of the ACM, 1974