Author:
Brown Daniel R. L.,Gallant Robert,Vanstone Scott A.
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. B. Arazi, “An identity-based DL/EC key agreement technique”, Presentation to IEEE P1363a, available from http://grouper.ieee.org/groups/1363/addendum.html
2. M. Bellare, “ Practice-oriented provable-security”, Proceedings of First International Workshop on Information Security (ISW’97), 1998.
3. M. Bellare and P. Rogaway, “Random oracles are practical: a paradigm for designing efficient protocols”, 1st ACM Conference on Computer and Communications Security, 1993 pp. 62–73.
4. D. Brown and D. Johnson, “Formal security proofs for a signature scheme with partial message recovery”, preprint, 2000.
5. D. Brown, “Implicitly Certifying Signatures Securely”, preprint, 2000.
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献