Information Technology Reference
In-Depth Information
10. Rohatchi, P.: “A Compact and Fast Hybrid Signature Scheme for Multicast Packet
Authentication,” in Proc. of 6th ACM conference on computer and communications
security (1999)
11. Rivest, R., Shamir, A., and Adleman, L.: “A Method for Obtaining Digital Signa-
tures and Public-Key Cryptosystems,” Communications of the ACM , vol. 21 (Feb.
1978) 120-126
12. Shamir, A.: “How to share a secret,” Communications of the ACM , 22 (November
1979) 612-613
13. Steinfeld, R. and Zheng, Y. “A Signcryption scheme based on Integer Factoriza-
tion,” Third International Workshop, Information Security ISW '00, Lecture Notes
in Computer Science, Springer-Verlag, volume 1975, Wollongong, Australia (2000)
308-322
14. Y. Zheng. “Digital Signcryption or How to Achieve Cost (Signature & Encryp-
tion << Cost (Signature) + Cost (Encryption), ” Advances in Cryptology -
CRYPTO'97 , Lecture Notes in Computer Science, Springer-Verlag, volume 1294,
Burt Kaliski (ed.), California (1997) 165-179
 
Search WWH ::




Custom Search