Security analysis of a practical “on the fly” authentication and signature generation
Open Access
- 1 January 1998
- book chapter
- Published by Springer Nature
- p. 422-436
- https://doi.org/10.1007/bfb0054143
Abstract
No abstract availableKeywords
This publication has 18 references indexed in Scilit:
- On the length of cryptographic hash-values used in identification schemesPublished by Springer Nature ,2001
- Security Proofs for Signature SchemesPublished by Springer Nature ,1996
- A World Wide Number Field Sieve factoring record: On to 512 bitsPublished by Springer Nature ,1996
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- A Course in Computational Algebraic Number TheoryPublished by Springer Nature ,1993
- An interactive identification scheme based on discrete logarithms and factoringJournal of Cryptology, 1992
- Computation of discrete logarithms in prime fieldsDesigns, Codes and Cryptography, 1991
- Zero-knowledge proofs of identityJournal of Cryptology, 1988
- The knowledge complexity of interactive proof-systemsPublished by Association for Computing Machinery (ACM) ,1985
- Riemann's hypothesis and tests for primalityJournal of Computer and System Sciences, 1976