The knowledge complexity of interactive proof-systems
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Efficient zero-knowledged identification scheme for smart cards
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
Computation of discrete logarithms in prime fields
Designs, Codes and Cryptography
A generalization of El Gamal's public key cryptosystem
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
An identity-based key-exchange protocol
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
How to keep authenticity alive in a computer network
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Inverting the pseudo exponentiation
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Verifiable secret sharing for monotone access structures
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A subexponential algorithm for discrete logarithms over all finite fields
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
CORSAIR: A SMART Card for Public Key Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
VLSI Design for Exponentiation in GF (2n)
AUSCRYPT '90 Proceedings of the International Conference on Cryptology: Advances in Cryptology
Non supersingular elliptic curves for public key cryptosystems
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
New directions in cryptography
IEEE Transactions on Information Theory
Fast evaluation of logarithms in fields of characteristic two
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
ID-based cryptographic schemes for user identification, digital signature, and key distribution
IEEE Journal on Selected Areas in Communications
Algorithm engineering for public key algorithms
IEEE Journal on Selected Areas in Communications
Hi-index | 0.24 |
The exponential security system TESS is a toolbox set system of different but cooperating cryptographic mechanisms and functions based on the primitive of discrete exponentiation. With these basic TESS functions, the security system user is able to adapt to very different ranges of applications and security requirements for computer systems, networks, mobile communication, identification, electronic cash, medical or road privacy. This paper describes the basic mechanisms and functions of TESS, demonstrating their suitability to applications in network security and electronic signature. For practitioners, an overview of the implementation of the system is given.