Accueil > Research > Biblio IBI WCC (liens mis à jour le 18 mai 2007)

Biblio IBI WCC (liens mis à jour le 18 mai 2007)
lundi 21 mai 2007
- Boneh D., Boyen X. . Efficient selective-id secure identity based encryption without random oracles. Eurocrypt 2004, LNCS 3027:223—238, 2004.
- Franklin M. and Boneh D. . Identity-based encryption from the weil pairing. Advances in Cryptology-Crypto’01, 2001.
- Bellare M.,Namprempre C. and Neven G. Security proofs sor identity-based authentication and signature schemes. Eurocrypt 2004, volume 3027 of Lecture Notes in Computer Science:268—286, 2004.
- Cha Jae Choon, Cheon Jung Hee. An identity-based signature from gap diffiehellman groups. Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography : Public Key Cryptography:18—30, January 06-08, 2003.
- Chen L. and Kudla C. Identity based authenticated key agreement from pairings. Cryptology ePrint Archive, Report 2002/184, 2002
- Chen X., Zhang F., Kim K. . A new id-based group signature scheme from bilinear pairings. WISA 2003, LNCS 2908:585—592, 2003.
- Cocks C. An identity based encryption scheme based on quadratic residues. Lecture Notes in Computer Science, Vol 2260:360—363, 2001.
- Cohen Henri . A course in computational algebraic number theory. Spinger- Verlag Graduate texts in mathematics, volume 138, 1993.
- Courtois Nicolas, Finiasz Matthieu , and Sendrier Nicolas . How to achieve a maceliece-based digital signature scheme. Asiacrypt 2001 volume 248, 2001.
- Gentry Craig , Silverberg Alice . Hierarchical id-based cryptography. Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security : Advances in Cryptology:548—566, December 01-05,2002.
- Hess Florian. Efficient identity based signature schemes based on pairings. Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography:310—324, August 15-16, 2002.
- Niederreiter Harald. Knapsack-type cryptosystems and algebraic coding theory. Prob. Contr. Inform. Theory, 1986.
- Paterson K. G. Id-based signatures from pairings on elliptic curves. Cryptology ePrint Archive, Report 2002/003, 2002.
- Sakai R., Ohgishi K. and Kasahara M. Cryptosystems based on pairing. SCIS 2000, 2000.
- Shamir Adi. Identity-based cryptosystems and signature schemes. Advances in Cryptology-Crypto’84, 1984.
- Smart N. A id-based authenticated key agreement protocol based on the weil pairings. Electron. Lett. 38(13):630—632, 2002.
- Stern Jacques. A new identification scheme based on syndrome decoding. Lecture Notes in Computer Science 773, 1994.
- MacEliece R. Berlekamp E. and van Tilborg H. On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory, IT- 24(3), 1978.
- Canteaut Anne and Chabaud Franžcois. A new algorithm for finding minimumweight words in a linear code : application to primitive narrow-sense bch codes oflength
- Duan Pu Cui Shi and Chan Choong Wah. An efficient identity-based signature scheme with batch verifications. page 22, 2006.
- Lee P. and Brickell E. An observation on the security of maceliece’s public-key cryptosystem. Advances in Cryptology-EUROCRYPT’88, C. Gunter:275—280, 1988.
- Leon J. A probabilistic algorithm for computing minimum weights of large error correcting codes. IEEE Trans. on Information Theory, IT-34:1354—1359, 1988.
- McEliece R.J. A public-key cryptosystem based on algebraic coding theory. JPL DSN Progress Report 42-44:114—116, 1978.
- Sloane N.J.A. MacWilliams F.J. The Theory of Error Correcting Codes, northholland. 1977.
- Sendrier N. Cryptosystèmes à clé publique basés sur les codes correcteurs d’erreurs. Mémoire d’habilitation, Inria 2002,available at : http://wwwrocq. inria.fr/codes/Nicolas.Sendrier/pub.html.
- Sendrier N. On the security of the maceliece public-key cryptosystem. In : M. Blaum, P.G. Farrell and H. van Tilborg,editors, Information, Coding and Mathematics:141—163, 2002.
- Stern Jacques. A method for finding codewords of small weight. coding theory and applications. Lecture Notes in Comput. Sci., 388, New York:106—113, 1989.
- Yi X. An identity-based signature scheme from the weil pairing. IEEE Communications Letters 7(2):76—78, 200.
- Yoon H., Cheon J. H. and Kim Y. Batch verifications with id-based signatures. ICISC 2004, LNCS 3506:223—248, 2005.