-
1
-
-
84898967539
-
How to Sign Given Any Trapdoor Function
-
Bellare, M., and Micali, S., How To Sign Given Any Trapdoor Function, Proc. STOC 88, pp. 32-42.
-
Proc. STOC
, vol.88
, pp. 32-42
-
-
Bellare, M.1
Micali, S.2
-
2
-
-
0026397734
-
Differential Cryptanalysis ofDES-Like Cryptosystems
-
Biham, E., and Shamir, A., Differential Cryptanalysis ofDES-Like Cryptosystems,JournalofCryplology, Vol. 4, No. 1, 1991, pp. 3-72.
-
(1991)
JournalofCryplology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
3
-
-
85028868533
-
Collision-Free Hash Functions and Public-Key Signature Schemes
-
LNCS, Springer-Verlag, Berlin
-
Damgard, I., Collision-Free Hash Functions and Public-Key Signature Schemes, EuroCrypt 87, LNCS, Vol. 304, Springer-Verlag, Berlin, 1988, pp. 203-216.
-
(1988)
EuroCrypt 87
, vol.304
, pp. 203-216
-
-
Damgard, I.1
-
4
-
-
33749278441
-
Secure Off-Line Electronic Fund Transfer between Nontrusting Parties
-
D. Chaum and I. Schaumuller-Bichl (eds.), North-Holland, Amsterdam
-
Even, S., Secure Off-Line Electronic Fund Transfer Between Nontrusting Parties, in Smart Card 2000: The Future of 1C Cards, D. Chaum and I. Schaumuller-Bichl (eds.), North-Holland, Amsterdam, 1989, pp. 57-66.
-
(1989)
Smart Card 2000: The Future of 1C Cards
, pp. 57-66
-
-
Even, S.1
-
5
-
-
0141982266
-
Electronic Wallet
-
D. Chaum (ed.), Plenum, New York
-
Even, S., Goldreich, O., and Yacobi, Y., Electronic Wallet, Advances in Cryptology: Proc. Crypto 83, D. Chaum (ed.), Plenum, New York, 1984, pp. 383-386.
-
(1984)
Advances in Cryptology: Proc. Crypto 83
, pp. 383-386
-
-
Even, S.1
Goldreich, O.2
Yacobi, Y.3
-
6
-
-
85028913061
-
On-Line/Off-Line Digital Signatures
-
G. Brassard (ed.), LNCS, Springer-Verlag, Berlin
-
Even, S., Goldreich, O., and Micali, S., On-Line/Off-Line Digital Signatures, Advances in Cryptology: Proc. Crypio 89, G. Brassard (ed.), LNCS, Vol. 435, Springer-Verlag, Berlin, 1990, pp. 263-277.
-
(1990)
Advances in Cryptology: Proc. Crypio 89
, vol.435
, pp. 263-277
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
7
-
-
84969346237
-
Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme
-
A. M. Odlyzko (ed.), LNCS, Springer-Verlag, Berlin
-
Goldreich, O., Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme, Advances in Cryptology-Crypto 86, A. M. Odlyzko (ed.), LNCS, Vol. 263, Springer-Verlag, Berlin, 1987, pp. 104-110.
-
(1987)
Advances in Cryptology-Crypto 86
, vol.263
, pp. 104-110
-
-
Goldreich, O.1
-
8
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
April
-
Goldwasser, S., Micali, S., and Rivest, R. L., A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, Vol. 17, No. 2, April 1988, pp. 281-308.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
9
-
-
85033035047
-
-
Manuscript, 1993. See preliminary versions by Impagliazzo, Levin, and Luby in Proc. 2lst STOC and by Hastad in Proc. 22ndSTOC
-
Hastad, J., Impagliazzo, R., Levin, L. A., and Luby, M., Construction of Pseudorandom Generator from Any One-Way Function, Manuscript, 1993. See preliminary versions by Impagliazzo, Levin, and Luby in Proc. 2lst STOC and by Hastad in Proc. 22ndSTOC.
-
Construction of Pseudorandom Generator from Any One-Way Function
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
10
-
-
51249173191
-
One-Way Functions and Pseudorandom Generators
-
Levin, L. A., One-Way Functions and Pseudorandom Generators, Combinatorica, Vol. 7, No. 4, 1987, pp. 357-363.
-
(1987)
Combinatorica
, vol.7
, Issue.4
, pp. 357-363
-
-
Levin, L.A.1
-
11
-
-
0003525990
-
-
North-Holland, Amsterdam
-
MacWilliams, F. J., and Sloane, N. J. A., The Theory of Error-Correcting Codes, North-Holland, Amsterdam, 1977.
-
(1977)
The Theory of Error-Correcting Codes
-
-
MacWilliams, F.J.1
Sloane, N.J.2
-
12
-
-
84958802026
-
A Digital Signature Based on a Conventional Encryption Function
-
C. Pomerance (ed.), LNCS, Springer-Verlag, Berlin
-
Merkle, R. C, A Digital Signature Based on a Conventional Encryption Function, Advances in Cryptology-Crypto 87, C. Pomerance (ed.), LNCS, Vol. 293, Springer-Verlag, Berlin, 1987, pp. 369-378.
-
(1987)
Advances in Cryptology-Crypto 87
, vol.293
, pp. 369-378
-
-
Merkle, R.C.1
-
13
-
-
84949044492
-
Bit Commitment Using Pseudorandom Generators
-
Naor, M., Bit Commitment Using Pseudorandom Generators, Proc. Crypto 89, pp. 123-132.
-
Proc. Crypto
, vol.89
, pp. 123-132
-
-
Naor, M.1
-
14
-
-
0024867751
-
Universal One-Way Hash Functions and Their Cryptographic Application
-
Naor, M., and Yung, M., Universal One-Way Hash Functions and Their Cryptographic Application, Proc. 21st STOC, 1989, pp. 33-43.
-
(1989)
Proc. 21st STOC
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
16
-
-
0347802687
-
Digital Signatures
-
R. A. DeMillo et al. (eds.), Academic Press, New York
-
Rabin, M. O., Digital Signatures, in Foundations of Secure Computation, R. A. DeMillo et al. (eds.), Academic Press, New York, 1978, pp. 155-168.
-
(1978)
Foundations of Secure Computation
, pp. 155-168
-
-
Rabin, M.O.1
-
17
-
-
0003614758
-
-
Report TR-212, Lab. for Computer Science, MIT, January
-
Rabin, M. O., Digitalized Signatures and Public-Key Functions as Intractable as Factorization, Report TR-212, Lab. for Computer Science, MIT, January 1979.
-
(1979)
Digitalized Signatures and Public-Key Functions As Intractable As Factorization
-
-
Rabin, M.O.1
-
18
-
-
78650922644
-
The MD4 Message Digest Algorithm
-
A. J. Menezes and S. A. Vanstone (eds.), LNCS, Springer-Verlag, Berlin
-
Rivest, R. L., The MD4 Message Digest Algorithm, Proc. Crypto 90, A. J. Menezes and S. A. Vanstone (eds.), LNCS, Vol. 537, Springer-Verlag, Berlin, 1991, pp. 303-311.
-
(1991)
Proc. Crypto 90
, vol.537
, pp. 303-311
-
-
Rivest, R.L.1
-
20
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R. L., Shamir, A., and Adleman, L., A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, Vol. 21, No. 2, 1978, pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
21
-
-
0025152622
-
One-Way Functions Are Necessary and Sufficient for Secure Signatures
-
Rompel, J., One-Way Functions Are Necessary and Sufficient for Secure Signatures, Proc. 22ndSTOC, 1990, pp. 387-394.
-
(1990)
Proc. 22ndSTOC
, pp. 387-394
-
-
Rompel, J.1
-
22
-
-
85033045496
-
-
Lecture Notes, Computer Science Dept., Technion, Haifa
-
Roth, R., Topics in Coding Theory, Lecture Notes, Computer Science Dept., Technion, Haifa, 1993.
-
(1993)
Topics in Coding Theory
-
-
Roth, R.1
-
23
-
-
0019080452
-
A Modification of the RSA Public-Key Encryption Procedure
-
Williams, H. C., A Modification of the RSA Public-Key Encryption Procedure, IEEE Transactions on Information Theory, Vol. 26, No. 6, 1980, pp. 726-729.
-
(1980)
IEEE Transactions on Information Theory
, vol.26
, Issue.6
, pp. 726-729
-
-
Williams, H.C.1
|