A secure and efficient conference key distribution system
- 1 January 1995
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- p. 275-286
- https://doi.org/10.1007/bfb0053443
Abstract
No abstract availableThis publication has 22 references indexed in Scilit:
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- How to sign given any trapdoor permutationJournal of the ACM, 1992
- Secure implementation of identification systemsJournal of Cryptology, 1991
- Perfect zero-knowledge in constant roundsPublished by Association for Computing Machinery (ACM) ,1990
- Minimum disclosure proofs of knowledgeJournal of Computer and System Sciences, 1988
- Discrete logarithms inGF(p)Algorithmica, 1986
- A private interactive test of a boolean predicate a minimum-knowledge public-key cryptosystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- How to Generate Cryptographically Strong Sequences of Pseudorandom BitsSIAM Journal on Computing, 1984
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979
- New directions in cryptographyIEEE Transactions on Information Theory, 1976