Back to Results
First PageMeta Content
Hashing / Search algorithms / Schnorr signature / Digital signature / Random oracle / One-way function / Universal hashing / RSA / Hash function / Cryptography / Public-key cryptography / Cryptographic hash functions


Proceedings of Selected Areas in Cryptography ’98 (August 17–18, 1998, Kingston, Ontario, Canada) S. Tavares and H. Meijer Eds. Springer-Verlag, LNCS 1556, pages 72–80. Computational Alternatives to Random Number G
Add to Reading List

Document Date: 2002-06-27 15:00:00


Open Document

File Size: 137,71 KB

Share Result on Facebook

City

Kingston / Paris / Plenum / Redwood City / /

Company

SIAM Journal / Fiat / Bayer / Jet Propulsion Laboratories / RSA Laboratories / ACM Press / Serge Vaudenay3 1 2 Gemplus Corporation / /

Country

Canada / United States / /

/

IndustryTerm

tamper-resistant device / signature device / digital signature algorithms / baby-step giant-step algorithm / verification algorithm / slow devices / signer using algorithm / tamper-resistant devices / computing / e-cash / /

Organization

Ecole Polytechnique / Ecole Normale Sup´erieure / /

Product

Pentax K-x Digital Camera / /

ProvinceOrState

New York / Ontario / California / /

PublishedMedium

IEEE Transactions on Information Theory / Journal of Cryptology / /

Technology

encryption / Cryptography / BBS / public key / same signer using algorithm / verification algorithm / Zero-Knowledge Protocol / digital signature algorithms / private key / secret key / DLP / digital signature / baby-step giant-step algorithm / depending on the public key / /

URL

http /

SocialTag