- 1.FIPS 180-1. Secure hash standard. In Federal Information Processing Standards Publication 180-1. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, 1995.]]Google Scholar
- 2.FIPS 186. Digital signature standard. In Federal Information Processing Standards Publication 186. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, 1994.]]Google Scholar
- 3.R. Anderson and M. Kuhn. Tamper resistance { a cautionary note. In The Second USENIX Workshop on Electronic Commerce, pages 1{11, 1996.]] Google ScholarDigital Library
- 4.R. Anderson and M. Kuhn. Low cost attacks against tamper-resistant devices. In M. Lomas et al., editor, Security Protocols, 5th International Workshop, pages 125{136. Springer-Verlag, 1997. LNCS no. 1361.]] Google ScholarDigital Library
- 5.Y. Aumann and M.O. Rabin. Authentication, enhanced security and error correcting codes (extended abstract). In H. Krawczyk, editor, Advances in Cryptology { Crypto '98, pages 299{303. Springer-Verlag, 1998. LNCS no. 1462.]] Google ScholarDigital Library
- 6.M. Bellare and S. Miner. A forward-secure digital signature scheme. In M. Wiener, editor, Advances in Cryptology - Crypto '99, pages 431{448. Springer-Verlag, 1999. LNCS no. 1666.]] Google ScholarDigital Library
- 7.J. Benaloh and D. Tuinstra. Receipt-free secret-ballot elections. In 26th ACM Symposium on Theory of Computing (STOC), pages 544{553. ACM Press, 1994.]] Google ScholarDigital Library
- 8.L. Blum, M. Blum, and M. Shub. A simple unpredictable pseudo-random number generator. SIAM Journal on Computing, 15(2):364{383, 1986.]] Google ScholarDigital Library
- 9.D. Boneh, R.A. Demillo, and R.J. Lipton. On the importance of checking cryptographic protocols for faults. In W. Fumy, editor, Advances in Cryptology - Eurocrypt '97, pages 37{51. Springer-Verlag, 1997. LNCS no. 1233.]]Google Scholar
- 10.M. Burmester, Y. Desmedt, and J. Seberry. Equitable key escrow with limited time span (or, how to enforce time expiration cryptographically). In K. Ohta and D. Pei, editors, Advances in Cryptology - Asiacrypt '98, pages 380{391. Springer-Verlag, 1998. LNCS no. 1514.]] Google ScholarDigital Library
- 11.R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky. Deniable encryption. In B.S. Kaliski, editor, Advances in Cryptology - Crypto '97, pages 90{104. Springer-Verlag, 1997. LNCS no. 1294.]] Google ScholarDigital Library
- 12.G. Davida, Y. Frankel, Y. Tsiounis, and M. Yung. Anonymity control in e-cash systems. In R. Hirschfeld, editor, Financial Cryptography '97, pages 1{16. Springer-Verlag, 1997. LNCS no. 1318.]] Google ScholarDigital Library
- 13.C. Dwork, M. Naor, and A. Sahai. Concurrent zeroknowledge. In STOC '98, pages 409{418. ACM Press, 1998.]] Google ScholarDigital Library
- 14.T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469{472, 1985.]]Google ScholarDigital Library
- 15.S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer and System Sciences, 28:270{299, 1984.]]Google ScholarCross Ref
- 16.J. H~astad, R. Impagliazzo, L. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM Journal on Computing, 28:1364{1396, 1999.]] Google ScholarDigital Library
- 17.D. Kahn. The Codebreakers. Macmillian Publishing Company, 1996.]]Google Scholar
- 18.O. K?ommerling and M.G. Kuhn. Design principles for tamper-resistant smartcard processors. In USENIX Workshop on Smartcard Technology (Smartcard '99), pages 9{20, 1999.]] Google ScholarDigital Library
- 19.M. Luby. Pseudorandomness and Cryptographic Applications. Princeton Univ. Press, 1996.]] Google ScholarDigital Library
- 20.A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.]] Google ScholarDigital Library
- 21.K. Sako and M. Hirt. E~cient receipt-free voting based on homomorphic encryption. In B. Preneel, editor, Advances in Cryptology { EUROCRYPT '00, pages 539{ 556. Springer-Verlag, 2000. LNCS no. 1807.]]Google Scholar
- 22.K. Sako and J. Kilian. Receipt-free mix-type voting scheme - a practical solution to the implementation of a voting booth. In L.C. Guillou and J.-J. Quisquater, editors, Advances in Cryptology { EUROCRYPT '95, pages 393{403. Springer-Verlag, 1995. LNCS no. 921.]]Google Scholar
- 23.G. Simmons. Subliminal channels; past and present. European Transactions on Telecommunications, 5(4):459{473, 1994.]]Google Scholar
- 24.Y. Tsiounis and M. Yung. On the security of ElGamalbased encryption. In 1998 International Workshop on Practice and Theory in Public Key Cryptography (PKC '98), pages 117{134. Springer-Verlag, 1998. LNCS no. 1431.]] Google ScholarDigital Library
Index Terms
- Funkspiel schemes: an alternative to conventional tamper resistance
Recommendations
Cryptoanalysis of Two Signcryption Schemes
IAS '09: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 02Certificateless PKC and self-certified PKC are two new public key systems. Theyremove the necessity of certificate to ensure the authentication of the user's public key in CB-PKC and also overcome the inherent key escrow problem in IB-PKC. Recently, ...
Identity-based strong designated verifier signature schemes: Attacks and new construction
A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party ...
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
CRYPTO '92: Proceedings of the 12th Annual International Cryptology Conference on Advances in CryptologyThis paper presents a three-move interactive identification scheme and proves it to be as secure as the discrete logarithm problem. This provably secure scheme is almost as efficient as the Schnorr identification scheme, while the Schnorr scheme is not ...
Comments