Accueil > Research > Biblio IBI WCC (liens mis à jour le 18 mai 2007)

Biblio IBI WCC (liens mis à jour le 18 mai 2007)

lundi 21 mai 2007

  1. Boneh D., Boyen X. . Efficient selective-id secure identity based encryption without random oracles. Eurocrypt 2004, LNCS 3027:223—238, 2004.
  2. Franklin M. and Boneh D. . Identity-based encryption from the weil pairing. Advances in Cryptology-Crypto’01, 2001.
  3. Bellare M.,Namprempre C. and Neven G. Security proofs sor identity-based authentication and signature schemes. Eurocrypt 2004, volume 3027 of Lecture Notes in Computer Science:268—286, 2004.
  4. Cha Jae Choon, Cheon Jung Hee. An identity-based signature from gap diffiehellman groups. Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography : Public Key Cryptography:18—30, January 06-08, 2003.
  5. Chen L. and Kudla C. Identity based authenticated key agreement from pairings. Cryptology ePrint Archive, Report 2002/184, 2002
  6. Chen X., Zhang F., Kim K. . A new id-based group signature scheme from bilinear pairings. WISA 2003, LNCS 2908:585—592, 2003.
  7. Cocks C. An identity based encryption scheme based on quadratic residues. Lecture Notes in Computer Science, Vol 2260:360—363, 2001.
  8. Cohen Henri . A course in computational algebraic number theory. Spinger- Verlag Graduate texts in mathematics, volume 138, 1993.
  9. Courtois Nicolas, Finiasz Matthieu , and Sendrier Nicolas . How to achieve a maceliece-based digital signature scheme. Asiacrypt 2001 volume 248, 2001.
  10. Gentry Craig , Silverberg Alice . Hierarchical id-based cryptography. Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security : Advances in Cryptology:548—566, December 01-05,2002.
  11. Hess Florian. Efficient identity based signature schemes based on pairings. Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography:310—324, August 15-16, 2002.
  12. Niederreiter Harald. Knapsack-type cryptosystems and algebraic coding theory. Prob. Contr. Inform. Theory, 1986.
  13. Paterson K. G. Id-based signatures from pairings on elliptic curves. Cryptology ePrint Archive, Report 2002/003, 2002.
  14. Sakai R., Ohgishi K. and Kasahara M. Cryptosystems based on pairing. SCIS 2000, 2000.
  15. Shamir Adi. Identity-based cryptosystems and signature schemes. Advances in Cryptology-Crypto’84, 1984.
  16. Smart N. A id-based authenticated key agreement protocol based on the weil pairings. Electron. Lett. 38(13):630—632, 2002.
  17. Stern Jacques. A new identification scheme based on syndrome decoding. Lecture Notes in Computer Science 773, 1994.
  18. MacEliece R. Berlekamp E. and van Tilborg H. On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory, IT- 24(3), 1978.
  19. Canteaut Anne and Chabaud Franžcois. A new algorithm for finding minimumweight words in a linear code : application to primitive narrow-sense bch codes oflength
  20. Duan Pu Cui Shi and Chan Choong Wah. An efficient identity-based signature scheme with batch verifications. page 22, 2006.
  21. Lee P. and Brickell E. An observation on the security of maceliece’s public-key cryptosystem. Advances in Cryptology-EUROCRYPT’88, C. Gunter:275—280, 1988.
  22. Leon J. A probabilistic algorithm for computing minimum weights of large error correcting codes. IEEE Trans. on Information Theory, IT-34:1354—1359, 1988.
  23. McEliece R.J. A public-key cryptosystem based on algebraic coding theory. JPL DSN Progress Report 42-44:114—116, 1978.
  24. Sloane N.J.A. MacWilliams F.J. The Theory of Error Correcting Codes, northholland. 1977.
  25. Sendrier N. Cryptosystèmes à clé publique basés sur les codes correcteurs d’erreurs. Mémoire d’habilitation, Inria 2002,available at : http://wwwrocq.
  26. Sendrier N. On the security of the maceliece public-key cryptosystem. In : M. Blaum, P.G. Farrell and H. van Tilborg,editors, Information, Coding and Mathematics:141—163, 2002.
  27. Stern Jacques. A method for finding codewords of small weight. coding theory and applications. Lecture Notes in Comput. Sci., 388, New York:106—113, 1989.
  28. Yi X. An identity-based signature scheme from the weil pairing. IEEE Communications Letters 7(2):76—78, 200.
  29. Yoon H., Cheon J. H. and Kim Y. Batch verifications with id-based signatures. ICISC 2004, LNCS 3506:223—248, 2005.

Répondre à cette brève

SPIP | | Plan du site | Suivre la vie du site RSS 2.0

Habillage visuel © Kozlika sous Licence GPL