applied cryptography - protocols, algorithms, and source code in c

1418 a shamir a polynomial time algorithm for

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: , “A Study on Data Security,” Master’s thesis, Tohuku University, Japan, 1988. (In Japanese.) 1194. K. Ohta, “A Secure and Efficient Encrypted Broadcast Communication System Using a Public Master Key,” Transactions of the Institute of Electronics, Information, and Communication Engineers, v. J70–D, n. 8, Aug 1987, pp. 1616–1624. 1195. K. Ohta, “An Electrical Voting Scheme Using a Single Administrator,” IEICE Spring National Convention, A–294, 1988, v. 1, p. 296. (In Japanese.) 1196. K. Ohta, “Identity–based Authentication Schemes Using the RSA Cryptosystem,” Transactions of the Institute of Electronics, Information, and Communication Engineers, v. J72D–II, n. 8, Aug 1989, pp. 612–620. 1197. K. Ohta and M. Matsui, “Differential Attack on Message Authentication Codes,” Advances in Cryptology—CRYPTO ’93 Proceedings, Springer–Verlag, 1994, pp. 200–223. 1198. K. Ohta and T. Okamoto, “Practical Extension of Fiat–Shamir Scheme,” Electronics Letters, v. 24, n. 15, 1988, pp. 955–956. 1199. K. Ohta and T. Okamoto, “A Modification of the Fiat–Shamir Scheme,” Advances in Cryptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 232–243. 1200. K. Ohta and T. Okamoto, “A Digital Multisignature Scheme Based on the Fiat–Shamir Scheme,” Advances in Cryptology—ASIACRYPT ’91 Proceedings, Springer–Verlag, 1993, pp. 139–148. 1201. K. Ohta, T. Okamoto and K. Koyama, “Membership Authentication for Hierarchy Multigroups Using the Extended Fiat–Shamir Scheme,” Advances in Cryptology—EUROCRYPT ’90 Proceedings, Springer–Verlag, 1991, pp. 446–457. 1202. E. Okamoto and K. Tanaka, “Key Distribution Based on Identification Information,” IEEE Journal on Selected Areas in Communication, v. 7, n. 4, May 1989, pp. 481–485. 1203. T. Okamoto, “Fast Public–Key Cryptosystems Using Congruent Polynomial Equations,” Electronics Letters, v. 22, n. 11, 1986, pp. 581–582. 1204. T. Okamoto, “Modification of a Public–Key Cryptosyst...
View Full Document

Ask a homework question - tutors are online