-
2
-
-
84958769452
-
-
BCDP 1990. Lecture Notes in Computer Science No. 537.
-
[BCDP] J. Boyar, D. Chaum, I. Damgard, and T. Pedersen. Convertible undeniable signatures. In A. J. Menezes and S. Vanstone, editors, Advances in Cryptology -Crypto '90, pages 189-205. Springer-Verlag, Berlin, 1990. Lecture Notes in Computer Science No. 537.
-
D. Chaum, I. Damgard, and T. Pedersen. Convertible Undeniable Signatures. in A. J. Menezes and S. Vanstone, Editors, Advances in Cryptology -Crypto '90, Pages 189-205. Springer-Verlag, Berlin
-
-
Boyar, J.1
-
4
-
-
84947906522
-
-
BR2 The exact security of digital signatures, 1996. Lecture Notes in Computer Science No. 1070.
-
[BR2] M. Bellare and P. Rogaway. The exact security of digital signatures, how to sign with RSA and Rabin. In U. Maurer, editor, Advances in Cryptology -Eurocrypt '96, pages 399-416. Springer-Verlag, Berlin, 1996. Lecture Notes in Computer Science No. 1070.
-
How to Sign with RSA and Rabin. in U. Maurer, Editor, Advances in Cryptology -Eurocrypt '96, Pages 399-416. Springer-Verlag, Berlin
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
33745972742
-
Undeniable signatures. in G. Brassard
-
CA 1989. Lecture Notes in Computer Science No. 435.
-
[CA] D. Chaum and H. van Antwerpen. Undeniable signatures. In G. Brassard, editor, Advances in Cryptology - Crypto '89, pages 212-217. Springer-Verlag, Berlin, 1989. Lecture Notes in Computer Science No. 435.
-
Editor, Advances in Cryptology - Crypto '89, Pages 212-217. Springer-Verlag, Berlin
-
-
Chaum, D.1
Van Antwerpen, H.2
-
6
-
-
85023982750
-
-
CEG 1987. Lecture Notes in Computer Science No. 304.
-
[CEG] D. Chaum, J.-H. Evertse, and J. van der Graaf. An improved protocol for demonstrating possession of a discrete logarithm and some generalizations. In D. Chaum, editor, Advances in Cryptology -Eurocrypt '87, pages 127-141. Springer-Verlag, Berlin, 1987. Lecture Notes in Computer Science No. 304.
-
J.-H. Evertse, and J. Van der Graaf. An Improved Protocol for Demonstrating Possession of A Discrete Logarithm and Some Generalizations. in D. Chaum, Editor, Advances in Cryptology -Eurocrypt '87, Pages 127-141. Springer-Verlag, Berlin
-
-
Chaum, D.1
-
9
-
-
84947955350
-
-
CHP pages 470-484. Springer-Verlag, Berlin, 1991. Lecture Notes in Computer Science No. 576.
-
[CHP] D. Chaum, E. van Heijst, and B. Pfitzmann. Cryptographically strong undeniable signatures, unconditionally secure for the signer. In J. Feigenbaum, editor, Advances in Cryptology -Crypto '91, pages 470-484. Springer-Verlag, Berlin, 1991. Lecture Notes in Computer Science No. 576.
-
E. Van Heijst, and B. Pfitzmann. Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. in J. Feigenbaum, Editor, Advances in Cryptology -Crypto '91
-
-
Chaum, D.1
-
10
-
-
33745985465
-
-
1992. Lecture Notes in Computer Science No. 740.
-
[CP] D. Chaum and T. Pedersen. Wallet databases with observers. In E. Brickell, editor, Advances in Cryptology - Crypto '92, pages 89-105. Springer-Verlag, Berlin, 1992. Lecture Notes in Computer Science No. 740.
-
Wallet Databases with Observers. in E. Brickell, Editor, Advances in Cryptology - Crypto '92, Pages 89-105. Springer-Verlag, Berlin
-
-
Chaum, D.1
Pedersen, T.2
-
11
-
-
0027961556
-
-
DDFY 1994.
-
[DDFY] A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung. How to share a function securely. In Proceedings of the 26th Annual Symposium on the Theory of Computing, pages 522-533. ACM, New York, 1994.
-
Y. Desmedt, Y. Frankel, and M. Yung. How to Share A Function Securely. in Proceedings of the 26th Annual Symposium on the Theory of Computing, Pages 522-533. ACM, New York
-
-
De Santis, A.1
-
12
-
-
84947933505
-
New convertible undeniable signature schemes. in U. Maurer
-
DP 1996. Lecture Notes in Computer Science No. 1070.
-
[DP] I. Damgård and T. Pedersen. New convertible undeniable signature schemes. In U. Maurer, editor, Advances in Cryptology - Eurocrypt '96, pages 372-386. Springer-Verlag, Berlin, 1996. Lecture Notes in Computer Science No. 1070.
-
Editor, Advances in Cryptology - Eurocrypt '96, Pages 372-386. Springer-Verlag, Berlin
-
-
Damgård, I.1
Pedersen, T.2
-
13
-
-
84958770476
-
Weaknesses of undeniable signature schemes. in J. Feigenbaum
-
DY 1991. Lecture Notes in Computer Science No. 576.
-
[DY] Y Desmedt and M. Yung. Weaknesses of undeniable signature schemes. In J. Feigenbaum, editor, Advances in Cryptology - Crypto '91, pages 205-220. Springer-Verlag, Berlin, 1991. Lecture Notes in Computer Science No. 576.
-
Editor, Advances in Cryptology - Crypto '91, Pages 205-220. Springer-Verlag, Berlin
-
-
Desmedt, Y.1
Yung, M.2
-
14
-
-
84969340886
-
-
FOO 1991. Lecture Notes in Computer Science No. 547.
-
[FOO] A. Fujioka, T. Okamoto, and K. Ohta. Interactive bi-proof systems and undeniable signature schemes. In D. Davies, editor, Advances in Cryptology - Eurocrypt '91, pages 243-256. Springer-Verlag, Berlin, 1991. Lecture Notes in Computer Science No. 547.
-
T. Okamoto, and K. Ohta. Interactive Bi-proof Systems and Undeniable Signature Schemes. in D. Davies, Editor, Advances in Cryptology - Eurocrypt '91, Pages 243-256. Springer-Verlag, Berlin
-
-
Fujioka, A.1
-
15
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems. in A. Odlyzko
-
FS 1986. Lecture Notes in Computer Science No. 263.
-
[FS] A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In A. Odlyzko, editor. Advances in Cryptology -Crypto '86, pages 186-194. Springer-Verlag, Berlin, 1986. Lecture Notes in Computer Science No. 263.
-
Editor. Advances in Cryptology -Crypto '86, Pages 186-194. Springer-Verlag, Berlin
-
-
Fiat, A.1
Shamir, A.2
-
16
-
-
84947441722
-
-
GJKR 1996. Lecture Notes in Computer Science No. 1109.
-
[GJKR] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of RSA functions. In N. Koblitz, editor, Advances in Cryptology -Crypto '96, pages 157-172. Springer-Verlag, Berlin, 1996. Lecture Notes in Computer Science No. 1109.
-
S. Jarecki, H. Krawczyk, and T. Rabin. Robust and Efficient Sharing of RSA Functions. in N. Koblitz, Editor, Advances in Cryptology -Crypto '96, Pages 157-172. Springer-Verlag, Berlin
-
-
Gennaro, R.1
-
22
-
-
84927752554
-
-
JSI 1996. Lecture Notes in Computer Science No. 1070.
-
[JSI] M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In U. Maurer, editor. Advances in Cryptology-Eurocrypt '96, pages 143-154. Springer-Verlag, Berlin, 1996. Lecture Notes in Computer Science No. 1070.
-
K. Sako, and R. Impagliazzo. Designated Verifier Proofs and Their Applications. in U. Maurer, Editor. Advances in Cryptology-Eurocrypt '96, Pages 143-154. Springer-Verlag, Berlin
-
-
Jakobsson, M.1
-
23
-
-
33745993723
-
Proving without knowing: On oblivious
-
J Y 1996. Lecture Notes in Computer Science No. 1109.
-
[J Y] M. Jakobsson and M. Yung. Proving without knowing: on oblivious, agnostic and blindfolded provers. In N. Koblitz, editor, A avances in Cryptology-Crypto '96, pages 201-215. Springer-Verlag, Berlin, 1996. Lecture Notes in Computer Science No. 1109.
-
Agnostic and Blindfolded Provers. in N. Koblitz, Editor, A Avances in Cryptology-Crypto '96, Pages 201-215. Springer-Verlag, Berlin
-
-
Jakobsson, M.1
Yung, M.2
-
26
-
-
84979016283
-
Designated confirmer signatures and public-key encryption are equivalent. in Y. Desmedt
-
Ok 1994. Lecture Notes in Computer Science No. 839.
-
[Ok] T. Okamoto. Designated confirmer signatures and public-key encryption are equivalent. In Y. Desmedt, editor, Advances in Cryptology -Crypto '94, pages 61-74. Springer-Verlag, Berlin, 1994. Lecture Notes in Computer Science No. 839.
-
Editor, Advances in Cryptology -Crypto '94, Pages 61-74. Springer-Verlag, Berlin
-
-
Okamoto, T.1
-
28
-
-
0009435059
-
Composite Diffie-Hellman public key generating systems are hard to break. Technical Report 356
-
Sh 1985.
-
[Sh] Z. Shmuely. Composite Diffie-Hellman public key generating systems are hard to break. Technical Report 356, Computer Science Department, Technion, Haifa, 1985.
-
Computer Science Department, Technion, Haifa
-
-
Shmuely, Z.1
|