-
2
-
-
0002181960
-
Digital multisignatures
-
H. Baker, F. Piper (Eds.), Claredon Press, Oxford
-
C. Boyd, Digital multisignatures, in: H. Baker, F. Piper (Eds.), Cryptography and Coding, Claredon Press, Oxford, 1989, pp. 241-246.
-
(1989)
Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
3
-
-
84984842401
-
Maintaining security in the presence of transient faults
-
Y. Desmedt (Ed.), Advances in cryptography - Crypto '94, Springer, Berlin
-
R. Canetti, A. Herzberg, Maintaining security in the presence of transient faults, in: Y. Desmedt (Ed.), Advances in cryptography - Crypto '94, Lecture Notes in Computer Science, vol. 839, Springer, Berlin, 1994, pp. 425-438.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 425-438
-
-
Canetti, R.1
Herzberg, A.2
-
4
-
-
0027580298
-
Efficient and secure multiparty generation of digital signatures based on discrete logarithms
-
M. Cerecedo, T. Matsumoto, H. Imai, Efficient and secure multiparty generation of digital signatures based on discrete logarithms, IEICE Trans. Fundamentals E76-A (4) (1993) 532-545.
-
(1993)
IEICE Trans. Fundamentals
, vol.E76-A
, Issue.4
, pp. 532-545
-
-
Cerecedo, M.1
Matsumoto, T.2
Imai, H.3
-
5
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum, R. Rivest and A. Sherman (eds.), Plenum, New York
-
D. Chaum, Blind signatures for untraceable payments, in: Advances in Cryptology - Crypto '82, in: D. Chaum, R. Rivest and A. Sherman (eds.), Plenum, New York, 1983. pp. 199-203.
-
(1983)
Advances in Cryptology - Crypto '82
, pp. 199-203
-
-
Chaum, D.1
-
6
-
-
0031701524
-
A security architecture for the internet protocol
-
P. Chen, J. Garay, A. Herzberg, H. Krawczyk, A security architecture for the internet protocol, IBM Systems J. 37 (1) (1998) 42-60.
-
(1998)
IBM Systems J.
, vol.37
, Issue.1
, pp. 42-60
-
-
Chen, P.1
Garay, J.2
Herzberg, A.3
Krawczyk, H.4
-
7
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
IEEE, Press, New York
-
B. Chor, S. Goldwasser, S. Micali, B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in: Proc. 26th Annu. Symp. on the Foundations of Computer Science, IEEE, Press, New York, 1985, pp. 383-395.
-
(1985)
Proc. 26th Annu. Symp. on the Foundations of Computer Science
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
8
-
-
0003200675
-
Public-key cryptography and re-usable shared secrets
-
H. Baker, F. Piper (Eds.), Claredon Press, Oxford
-
R.A. Croft, S.P. Harris, Public-key cryptography and re-usable shared secrets, in: H. Baker, F. Piper (Eds.), Cryptography and Coding, Claredon Press, Oxford, 1989, pp. 189-201.
-
(1989)
Cryptography and Coding
, pp. 189-201
-
-
Croft, R.A.1
Harris, S.P.2
-
9
-
-
0027961556
-
How to share a function securely
-
ACM, New York
-
A. De Santis, Y. Desmedt, Y. Frankel, M. Yung, How to share a function securely, in: Proc. 26th Annu. Symp. on the Theory of Computing, ACM, New York, 1994, pp. 522-533.
-
(1994)
Proc. 26th Annu. Symp. on the Theory of Computing
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
10
-
-
85022187530
-
Shared generation of authenticators and signatures
-
J. Feigenbaum (Ed.), Advances in Cryptology - Crypto '91, Springer, Berlin
-
Y. Desmedt, Y. Frankel, Shared generation of authenticators and signatures, in: J. Feigenbaum (Ed.), Advances in Cryptology - Crypto '91, Lecture Notes in Computer Science, vol. 576, Springer, Berlin, 1991, pp. 457-469.
-
(1991)
Lecture Notes in Computer Science
, vol.576
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
11
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
C. Pomerance (Ed.), Advances in Cryptology - Crypto '87, Springer, Berlin
-
Y. Desmedt, Society and group oriented cryptography: a new concept, in: C. Pomerance (Ed.), Advances in Cryptology - Crypto '87, Lecture Notes in Computer Science, vol. 293, Springer, Berlin, 1987, pp. 120-127.
-
(1987)
Lecture Notes in Computer Science
, vol.293
, pp. 120-127
-
-
Desmedt, Y.1
-
12
-
-
85023809951
-
Threshold cryptosystems
-
G. Brassard (Ed.), Advances in Cryptology -Crypto '89, Springer, Berlin
-
Y. Desmedt, Y. Frankel, Threshold cryptosystems, in: G. Brassard (Ed.), Advances in Cryptology -Crypto '89, Lecture Notes in Computer Science, vol. 435, Springer, Berlin, 1989, pp. 307-315.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
13
-
-
0028462933
-
Threshold cryptography
-
Y. Desmedt, Threshold cryptography, Eur. Trans. Telecom. 5 (4) (1994) 449-457.
-
(1994)
Eur. Trans. Telecom.
, vol.5
, Issue.4
, pp. 449-457
-
-
Desmedt, Y.1
-
14
-
-
0031375570
-
Optimal resilience proactive public-key cryptosystems
-
IEEE, Press, New York
-
Y. Frankel, P. Gemmell, P. Mackenzie, M. Yung, Optimal resilience proactive public-key cryptosystems, in: Proc. 38th Annu. Symp. on Foundations of Computer Science, IEEE, Press, New York, 1997, pp. 384-393.
-
(1997)
Proc. 38th Annu. Symp. on Foundations of Computer Science
, pp. 384-393
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
15
-
-
0029713931
-
Witness-based cryptographic program checking and robust function sharing
-
ACM, New York
-
Y. Frankel, P. Gemmell, M. Yung, Witness-based cryptographic program checking and robust function sharing, in: Proc. 28th Annu. Symp. on The Theory of Computing, ACM, New York, 1996, pp. 499-508.
-
(1996)
Proc. 28th Annu. Symp. on the Theory of Computing
, pp. 499-508
-
-
Frankel, Y.1
Gemmell, P.2
Yung, M.3
-
16
-
-
84958676203
-
Proactive RSA
-
B. Kaliski (Ed.), Advances in Cryptology - Crypto '97, Springer, Berlin
-
Y. Frankel, P. Gemmell, P. Mackenzie, M. Yung, Proactive RSA, in: B. Kaliski (Ed.), Advances in Cryptology - Crypto '97, Lecture Notes in Computer Science, vol. 1294, Springer, Berlin, 1997, pp. 440-454.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 440-454
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
17
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory IT-31 (4) (1985) 469-472.
-
(1985)
IEEE Trans. Inform. Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
18
-
-
84949189366
-
Secure distributed storage and retrieval
-
M. Mavronicolas, P. Tsigas (Eds.), 11th Internat. Workshop, WDAG '97, Springer, Berlin
-
J. Garay, R. Gennaro, C. Jutla, T. Rabin, Secure distributed storage and retrieval, in: M. Mavronicolas, P. Tsigas (Eds.), 11th Internat. Workshop, WDAG '97, Lecture Notes in Computer Science, vol. 1320, Springer, Berlin, 1997, pp. 275-289.
-
(1997)
Lecture Notes in Computer Science
, vol.1320
, pp. 275-289
-
-
Garay, J.1
Gennaro, R.2
Jutla, C.3
Rabin, T.4
-
19
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
N. Koblitz (Ed.), Advances in Cryptology - Crypto '96 Springer, Berlin
-
R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, Robust and efficient sharing of RSA functions, in: N. Koblitz (Ed.), Advances in Cryptology - Crypto '96 Lecture Notes in Computer Science, vol. 1109, Springer, Berlin, 1996, pp. 157-172.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
20
-
-
84947926543
-
Robust threshold DSS signatures
-
Ueli Maurer (Ed.), Advances in Cryptology - Eurocrypt '96, Springer, Berlin
-
R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, Robust threshold DSS signatures, in: Ueli Maurer (Ed.), Advances in Cryptology - Eurocrypt '96, Lecture Notes in Computer Science, vol. 1070, Springer, Berlin, 1996, pp. 354-371.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
23
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, R. Rivest, A digital signature scheme secure against adaptive chosen-message attacks, SIAM J. Comput. 17 (2) (1988) 281-308.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
24
-
-
0028508211
-
Group oriented (t, n) digital signature scheme
-
L. Harn, Group oriented (t, n) digital signature scheme, IEE Proc.-Comput. Digit. Tech. 141 (5) (1994) 307-313.
-
(1994)
IEE Proc.-Comput. Digit. Tech.
, vol.141
, Issue.5
, pp. 307-313
-
-
Harn, L.1
-
25
-
-
0030646698
-
Proactive public key and signature systems
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, M. Yung, Proactive public key and signature systems, in: ACM Conf. on Computers and Communication Security, 1997.
-
(1997)
ACM Conf. on Computers and Communication Security
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
26
-
-
84957626176
-
Proactive secret sharing, or: How to cope with perpetual leakage
-
D. Coppersmith (Ed.), Advances in Cryptology - Crypto '95, Springer, Berlin
-
A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, Proactive secret sharing, or: how to cope with perpetual leakage, in: D. Coppersmith (Ed.), Advances in Cryptology - Crypto '95, Lecture Notes in Computer Science, vol. 963, Springer, Berlin, 1995, pp. 339-352.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
29
-
-
85028775022
-
Secret sharing made short
-
D. Stinson (Ed.), Advances in Cryptology - Crypto '93, Springer, Berlin
-
H. Krawczyk, Secret sharing made short, in: D. Stinson (Ed.), Advances in Cryptology - Crypto '93, Lecture Notes in Computer Science, vol. 773, Springer, Berlin, 1993, pp. 136-146.
-
(1993)
Lecture Notes in Computer Science
, vol.773
, pp. 136-146
-
-
Krawczyk, H.1
-
30
-
-
85027164480
-
How to withstand mobile virus attacks
-
ACM, New York
-
R. Ostrovsky, M. Yung, How to withstand mobile virus attacks in: Proc. 10th ACM Symp. on Principles of Distributed Computation, ACM, New York, 1991, pp. 51-59.
-
(1991)
Proc. 10th ACM Symp. on Principles of Distributed Computation
, pp. 51-59
-
-
Ostrovsky, R.1
Yung, M.2
-
31
-
-
0029769836
-
New ElGamal type threshold digital signature scheme
-
C. Park, K. Kurosawa, New ElGamal type threshold digital signature scheme, IEICE Trans. Fundamentals E79-A (1) (1996) 86-93.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.1
, pp. 86-93
-
-
Park, C.1
Kurosawa, K.2
-
32
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
M. Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance, J. ACM 36 (2) (1989) 335-348.
-
(1989)
J. ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.1
-
33
-
-
84957689308
-
A simplified approach to threshold and proactive RSA
-
H. Krawczyk (Ed.), Advances in Cryptology - Crypto '98, Springer, Berlin
-
T. Rabin, A simplified approach to threshold and proactive RSA, in: H. Krawczyk (Ed.), Advances in Cryptology - Crypto '98, LNCS, vol. 1462, Springer, Berlin, 1998, pp. 89-104.
-
(1998)
LNCS
, vol.1462
, pp. 89-104
-
-
Rabin, T.1
-
34
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Comm. ACM 21 (2) (1978) 120-126.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
35
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Comm. ACM 22 (1979) 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|