On the length of cryptographic hash-values used in identification schemes
- 13 July 2001
- book chapter
- Published by Springer Nature
- p. 202-215
- https://doi.org/10.1007/3-540-48658-5_21
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- An Efficient Identification Scheme Based on Permuted Kernels (extended abstract)Published by Springer Nature ,2001
- Efficient Identification and Signatures for Smart CardsPublished by Springer Nature ,2001
- An alternative to the Fiat-Shamir protocolPublished by Springer Nature ,1990
- Zero-knowledge proofs of identityJournal of Cryptology, 1988
- A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and MemoryPublished by Springer Nature ,1988
- An efficient solution of the congruencex^2 + ky^2 = mpmod{n}IEEE Transactions on Information Theory, 1987
- The knowledge complexity of interactive proof-systemsPublished by Association for Computing Machinery (ACM) ,1985