Anais - Engenharia de Redes de Comunicação - UnB
Anais - Engenharia de Redes de Comunicação - UnB
Anais - Engenharia de Redes de Comunicação - UnB
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Fiat, A. and Shamir, A. (1986). How to prove yourself: Practical solutions to i<strong>de</strong>ntification<br />
and signature problems. In Odlyzko, A. M., editor, CRYPTO, volume 263 of Lecture<br />
Notes in Computer Science, pages 186–194. Springer.<br />
Gaborit, P. and Girault, M. (2007). Lightweight co<strong>de</strong>-based i<strong>de</strong>ntification and signature.<br />
IEEE Transactions on Information Theory (ISIT), pages 186–194.<br />
Girault, M. (1990). A (non-practical) three-pass i<strong>de</strong>ntification protocol using coding theory.<br />
In Seberry, J. and Pieprzyk, J., editors, AUSCRYPT, volume 453 of Lecture Notes<br />
in Computer Science, pages 265–272. Springer.<br />
Goldwasser, S., Micali, S., and Rackoff, C. (1985). The knowledge complexity of interactive<br />
proof-systems. In Proceedings of the seventeenth annual ACM symposium on<br />
Theory of computing, page 304. ACM.<br />
Harari, S. (1988). A new authentication algorithm. In Cohen, G. D. and Wolfmann, J.,<br />
editors, Coding Theory and Applications, volume 388 of Lecture Notes in Computer<br />
Science, pages 91–105. Springer.<br />
Kawachi, A., Tanaka, K., and Xagawa, K. (2008). Concurrently secure i<strong>de</strong>ntification<br />
schemes based on the worst-case hardness of lattice problems. In ASIACRYPT ’08:<br />
Proceedings of the 14th International Conference on the Theory and Application of<br />
Cryptology and Information Security, pages 372–389, Berlin, Hei<strong>de</strong>lberg. Springer-<br />
Verlag.<br />
Lyubashevsky, V. (2008). Lattice-based i<strong>de</strong>ntification schemes secure un<strong>de</strong>r active attacks.<br />
In Cramer, R., editor, Public Key Cryptography, volume 4939 of Lecture Notes<br />
in Computer Science, pages 162–179. Springer.<br />
Lyubashevsky, V. and Micciancio, D. (2006). Generalized compact knapsacks are collision<br />
resistant. In Bugliesi, M., Preneel, B., Sassone, V., and Wegener, I., editors, ICALP<br />
(2), volume 4052 of Lecture Notes in Computer Science, pages 144–155. Springer.<br />
Lyubashevsky, V., Micciancio, D., Peikert, C., and Rosen, A. (2008). Swifft: A mo<strong>de</strong>st<br />
proposal for fft hashing. In Nyberg, K., editor, FSE, volume 5086 of Lecture Notes in<br />
Computer Science, pages 54–72. Springer.<br />
Micciancio, D. (2007). Generalized compact knapsacks, cyclic lattices, and efficient oneway<br />
functions. In Computational Complexity. Springer.<br />
Micciancio, D. and Goldwasser, S. (2002). Complexity of Lattice Problems: a cryptographic<br />
perspective, volume 671 of The Kluwer International Series in Engineering<br />
and Computer Science. Kluwer Aca<strong>de</strong>mic Publishers, Boston, Massachusetts.<br />
Shor, P. W. (1994). Polynominal time algorithms for discrete logarithms and factoring on<br />
a quantum computer. In Adleman, L. M. and Huang, M.-D. A., editors, ANTS, volume<br />
877 of Lecture Notes in Computer Science, page 289. Springer.<br />
Stern, J. (1993). A new i<strong>de</strong>ntification scheme based on syndrome <strong>de</strong>coding. In Stinson,<br />
D. R., editor, CRYPTO, volume 773 of Lecture Notes in Computer Science, pages 13–<br />
21. Springer.<br />
Véron, P. (1995). Cryptanalysis of harari’s i<strong>de</strong>ntification scheme. In Boyd, C., editor, IMA<br />
Conf., volume 1025 of Lecture Notes in Computer Science, pages 264–269. Springer.<br />
106