Information Technology Reference
In-Depth Information
10. Rohatchi, P.: “A Compact and Fast Hybrid Signature Scheme for Multicast Packet
Authentication,” in
Proc. of 6th ACM conference on computer and communications
security
(1999)
11. Rivest, R., Shamir, A., and Adleman, L.: “A Method for Obtaining Digital Signa-
tures and Public-Key Cryptosystems,”
Communications of the ACM
, vol. 21 (Feb.
1978) 120-126
12. Shamir, A.: “How to share a secret,”
Communications of the ACM
, 22 (November
1979) 612-613
13. Steinfeld, R. and Zheng, Y. “A Signcryption scheme based on Integer Factoriza-
tion,” Third International Workshop, Information Security
ISW '00,
Lecture Notes
in Computer Science, Springer-Verlag, volume 1975, Wollongong, Australia (2000)
308-322
14. Y. Zheng. “Digital Signcryption or How to Achieve Cost (Signature & Encryp-
tion
<<
Cost (Signature) + Cost (Encryption), ”
Advances in Cryptology -
CRYPTO'97
, Lecture Notes in Computer Science, Springer-Verlag, volume 1294,
Burt Kaliski (ed.), California (1997) 165-179