Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
148
views
0
references
Top references
cited by
331
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,817
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology
Identity-Based Cryptosystems and Signature Schemes
other
Author(s):
Adi Shamir
Publication date
(Online):
November 24 2000
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Transnational Chinese identity
Author and book information
Book Chapter
Pages
: 47-53
DOI:
10.1007/3-540-39568-7_5
SO-VID:
38bfcfb9-f82b-4e15-915a-5da01272cd0a
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 10
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
pp. 47
Identity-Based Cryptosystems and Signature Schemes
pp. 54
A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields (preliminary draft)
pp. 231
Generalized Linear Threshold Scheme
pp. 242
Security of Ramp Schemes
pp. 276
On the Cryptographic Applications of Random Functions (Extended Abstract)
pp. 289
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
pp. 342
Breaking Iterated Knapsacks
pp. 359
Dependence of output on input in DES: Small avalanche characteristics
pp. 377
Des has no Per Round Linear Factors
pp. 393
A Message Authenticator Algorithm Suitable for a Mainframe Computer
pp. 411
Authentication Theory/Coding Theory
Similar content
3,817
Asymmetric optical cryptosystem for multiple images based on devil’s spiral Fresnel lens phase and random spiral transform in gyrator domain
Authors:
Hang Chen
,
Zhengjun Liu
,
Camel Tanougast
…
Cryptosystem design based on Hermitian curves for IoT security
Authors:
OA Alzubi
,
Omar Alzubi
,
Jafar A. Alzubi
…
Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling
Authors:
De Rosal Ignatius Moses Setiadi
,
Eko Hari Rachmawanto
,
Rahmawati Zulfiningrum
See all similar
Cited by
326
GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications
Authors:
Xiaoting Sun
,
Pin-Han Ho
,
Xuemin Shen
…
Authentication and authenticated key exchanges
Authors:
Whitfield Diffie
,
Paul C. van Oorschot
,
Michael J. Wiener
Anonymous Authentication for Wireless Body Area Networks With Provable Security
Authors:
Jong-Hyouk Lee
,
Sherali Zeadally
,
Neeraj Kumar
…
See all cited by