18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Fiat, A. and Shamir, A. (1986). How to prove yourself: Practical solutions to i<strong>de</strong>ntification<br />

and signature problems. In Odlyzko, A. M., editor, CRYPTO, volume 263 of Lecture<br />

Notes in Computer Science, pages 186–194. Springer.<br />

Gaborit, P. and Girault, M. (2007). Lightweight co<strong>de</strong>-based i<strong>de</strong>ntification and signature.<br />

IEEE Transactions on Information Theory (ISIT), pages 186–194.<br />

Girault, M. (1990). A (non-practical) three-pass i<strong>de</strong>ntification protocol using coding theory.<br />

In Seberry, J. and Pieprzyk, J., editors, AUSCRYPT, volume 453 of Lecture Notes<br />

in Computer Science, pages 265–272. Springer.<br />

Goldwasser, S., Micali, S., and Rackoff, C. (1985). The knowledge complexity of interactive<br />

proof-systems. In Proceedings of the seventeenth annual ACM symposium on<br />

Theory of computing, page 304. ACM.<br />

Harari, S. (1988). A new authentication algorithm. In Cohen, G. D. and Wolfmann, J.,<br />

editors, Coding Theory and Applications, volume 388 of Lecture Notes in Computer<br />

Science, pages 91–105. Springer.<br />

Kawachi, A., Tanaka, K., and Xagawa, K. (2008). Concurrently secure i<strong>de</strong>ntification<br />

schemes based on the worst-case hardness of lattice problems. In ASIACRYPT ’08:<br />

Proceedings of the 14th International Conference on the Theory and Application of<br />

Cryptology and Information Security, pages 372–389, Berlin, Hei<strong>de</strong>lberg. Springer-<br />

Verlag.<br />

Lyubashevsky, V. (2008). Lattice-based i<strong>de</strong>ntification schemes secure un<strong>de</strong>r active attacks.<br />

In Cramer, R., editor, Public Key Cryptography, volume 4939 of Lecture Notes<br />

in Computer Science, pages 162–179. Springer.<br />

Lyubashevsky, V. and Micciancio, D. (2006). Generalized compact knapsacks are collision<br />

resistant. In Bugliesi, M., Preneel, B., Sassone, V., and Wegener, I., editors, ICALP<br />

(2), volume 4052 of Lecture Notes in Computer Science, pages 144–155. Springer.<br />

Lyubashevsky, V., Micciancio, D., Peikert, C., and Rosen, A. (2008). Swifft: A mo<strong>de</strong>st<br />

proposal for fft hashing. In Nyberg, K., editor, FSE, volume 5086 of Lecture Notes in<br />

Computer Science, pages 54–72. Springer.<br />

Micciancio, D. (2007). Generalized compact knapsacks, cyclic lattices, and efficient oneway<br />

functions. In Computational Complexity. Springer.<br />

Micciancio, D. and Goldwasser, S. (2002). Complexity of Lattice Problems: a cryptographic<br />

perspective, volume 671 of The Kluwer International Series in Engineering<br />

and Computer Science. Kluwer Aca<strong>de</strong>mic Publishers, Boston, Massachusetts.<br />

Shor, P. W. (1994). Polynominal time algorithms for discrete logarithms and factoring on<br />

a quantum computer. In Adleman, L. M. and Huang, M.-D. A., editors, ANTS, volume<br />

877 of Lecture Notes in Computer Science, page 289. Springer.<br />

Stern, J. (1993). A new i<strong>de</strong>ntification scheme based on syndrome <strong>de</strong>coding. In Stinson,<br />

D. R., editor, CRYPTO, volume 773 of Lecture Notes in Computer Science, pages 13–<br />

21. Springer.<br />

Véron, P. (1995). Cryptanalysis of harari’s i<strong>de</strong>ntification scheme. In Boyd, C., editor, IMA<br />

Conf., volume 1025 of Lecture Notes in Computer Science, pages 264–269. Springer.<br />

106

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!