Forward-Security in Private-Key Cryptography, Proceedings, pp.1-18, 2003. ,
DOI : 10.1007/3-540-36563-X_1
URL : http://www.cs.ucsd.edu/~mihir/papers/fspkc.pdf
Two remarks on public-key cryptology -invited lecture, the fourth ACM Conference on Computer and Communications Security (CCS), 1997. ,
A forward-secure digital signature scheme Advances in Cryptology -CRYPTO '99, 19th Annual International Cryptology Conference, pp.431-448, 1999. ,
Forward-secure signatures with optimal signing and verifying Advances in Cryptology -CRYPTO, 21st Annual International Cryptology Conference, pp.332-354, 2001. ,
DOI : 10.1007/3-540-44647-8_20
Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods, Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, pp.400-417, 2002. ,
DOI : 10.1007/3-540-46035-7_27
A New Forward-Secure Digital Signature Scheme, 6th International Conference on the Theory and Application of Cryptology and Information Security, pp.116-129, 2000. ,
DOI : 10.1007/3-540-44448-3_10
Fast signature generation with a fiat shamir-like scheme Advances in Cryptology -EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Proceedings, pp.432-440, 1990. ,
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory, Advances in Cryptology -EUROCRYPT '88, Workshop on the Theory and Application of of Cryptographic Techniques, pp.123-128, 1988. ,
DOI : 10.1007/3-540-45961-8_11
Simple forward-secure signatures from any signature scheme, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.108-115, 2000. ,
DOI : 10.1145/352600.352617
URL : http://eprint.iacr.org/2001/042.ps.gz
Logcrypt: forward security and public verification for secure audit logs In: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop, Network Security), pp.203-211, 2006. ,
Forward-secure signatures in untrusted update environments, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.266-275, 2007. ,
DOI : 10.1145/1315245.1315279
URL : http://www.dice.ucl.ac.be/~libert/FS-untrusted-ccs.pdf
Forward-Secure Signatures with Fast Key Update, Security in Communication Networks, Third International Conference, pp.241-256, 2002. ,
DOI : 10.1007/3-540-36413-7_18
URL : http://www.cs.bu.edu/~reyzin/papers/kreus.pdf
Forward-secure signatures with untrusted update, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.191-200, 2006. ,
DOI : 10.1145/1180405.1180430
URL : http://ai.stanford.edu/~xb/ccs06/fsig.ps
Hierarchical Identity Based Encryption with Constant Size Ciphertext, Advances in Cryptology -EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.440-456, 2005. ,
DOI : 10.1007/11426639_26
Tighter reductions for forwardsecure signature schemes, Public-Key Cryptography -PKC 2013 -16th International Conference on Practice and Theory in Public-Key Cryptography, pp.292-311, 2013. ,
DOI : 10.1007/978-3-642-36362-7_19
URL : https://hal.archives-ouvertes.fr/hal-01132190