-
1
-
-
84941466410
-
Smart cards can compute secret heavy functions with powerful terminals
-
Enoshima-Island, Japan, Nov.
-
T. Matsumoto, K. Kato, and H. Iami, “Smart cards can compute secret heavy functions with powerful terminals” (In Japanese), in Proc. 10th Symp. Inform. Theory Appl., Enoshima-Island, Japan, Nov. 1987, pp. 17–22.
-
(1987)
(In Japanese), in Proc. 10th Symp. Inform. Theory Appl
, pp. 17-22
-
-
Matsumoto, T.1
Kato, K.2
Iami, H.3
-
2
-
-
85031767993
-
Speeding up secret computations with insecure auxiliary devices
-
New York: Springer-Verlag
-
T. Matsumoto, K. Kato, and H. Iami, “Speeding up secret computations with insecure auxiliary devices,” in Advances in Cryptology—CRYPTO '88, Lecture Notes in Computer Science, 403. New York: Springer-Verlag, 1990, pp. 497–506.
-
(1990)
Advances in Cryptology–CRYPTO '88, Lecture Notes in Computer Science
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Iami, H.3
-
3
-
-
85034638281
-
Encrypting problem instances, or…, Can you take advantage of someone without having to trust him?
-
New York: Springer-Verlag
-
J. Feigenbaum, “Encrypting problem instances, or …, Can you take advantage of someone without having to trust him?” in Advances in Cryptology—CRYPTO’85, Lecture Notes in Computer Science, 219. New York: Springer-Verlag, 1986, 477–488.
-
(1986)
Advances in Cryptology—CRYPTO’85, Lecture Notes in Computer Science, 219
, pp. 477-488
-
-
Feigenbaum, J.1
-
4
-
-
0041089975
-
On hiding information from an oracle
-
M. Abadi, J. Feigenbaum, and J. Kilian, “On hiding information from an oracle,” J. Comput. Syst. Sci., no. 39, 21–50, 1989.
-
(1989)
J. Comput. Syst. Sci
, Issue.39
, pp. 21-50
-
-
Abadi, M.1
Feigenbaum, J.2
Kilian, J.3
-
5
-
-
33745511846
-
Hiding instances in multioracle queries
-
New York: Springer-Verlag
-
D. Beaver and J. Feigenbaum, “Hiding instances in multioracle queries,” in Proc. 7th STACS, Lecture Note in Computer Science, 415. New York: Springer-Verlag, 1990, pp. 37-48.
-
(1990)
Proc. 7th STACS, Lecture Note in Computer Science
, Issue.415
, pp. 37-48
-
-
Beaver, D.1
Feigenbaum, J.2
-
6
-
-
85088410659
-
A note on one-prover, instancehiding zero-knowledge proof systems
-
New York: Springer-Verlag, Nov.
-
J. Feigenbaum and R. Ostrovsky, “A note on one-prover, instancehiding zero-knowledge proof systems” in ASIACRYPT’ 91 Abstract, Fujiyoshida, Japan; to appear in Lecture Notes in Computer Science. New York: Springer-Verlag, Nov. 1991.
-
(1991)
ASIACRYPT’ 91 Abstract, Fujiyoshida, Japan; to appear in Lecture Notes in Computer Science
-
-
Feigenbaum, J.1
Ostrovsky, R.2
-
7
-
-
84955571647
-
Two efficient server-aided secret computation protocols based on the addition sequence
-
New York: Springer-Verlag, Nov.
-
C. Laih, S. Yen, and L. Ham, “Two efficient server-aided secret computation protocols based on the addition sequence,” in ASIACRYPT 91 Abstract, Fujiyoshida, Japan; to appear in Lecture Notes in Computer Science. New York: Springer-Verlag, Nov. 1991.
-
(1991)
ASIACRYPT 91 Abstract, Fujiyoshida, Japan; to appear in Lecture Notes in Computer Science
-
-
Laih, C.1
Yen, S.2
Ham, L.3
-
8
-
-
0005063381
-
Speeding up smart card RSA computation with insure coprocessors
-
Amsterdam, North-Holland, Oct.
-
J.J. Quisquater and M. De Soete, “Speeding up smart card RSA computation with insure coprocessors,” in Proc. SMART CARD 2000, Amsterdam, North-Holland, Oct. 1989, pp. 191–197.
-
(2000)
Proc. SMART CARD 2000
, pp. 191-197
-
-
Quisquater, J.J.1
DeSoete, M.2
-
9
-
-
0346395014
-
On the evaluation of powers
-
A. C. Yao, “On the evaluation of powers,” SIAM J. Comput., vol. 5, no. 1, pp. 100–103, 1976.
-
(1976)
SIAM J. Comput
, vol.5
, Issue.1
, pp. 100-103
-
-
Yao, A.C.1
-
11
-
-
0021941417
-
The knowledge complexity of interactive proof systems
-
May
-
S. Goldwasser, S. Micali, and C. Rackoff, “The knowledge complexity of interactive proof systems,” in Proc. 17th Annu. ACM Symp. Theory Comput., May 1985, pp. 291–304.
-
(1985)
Proc. 17th Annu. ACM Symp. Theory Comput
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
12
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Commun. ACM, pp. 120–126, 1978.
-
(1978)
Commun. ACM
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
14
-
-
84941445853
-
-
Seminumerical Algorithms, 2nd ed. Reading, MA
-
D. E. Knuth, The Art of Computer Programming, Vol. 2, Seminumerical Algorithms, 2nd ed. Reading, MA, 1981, 451.
-
(1981)
The Art of Computer Programming
, vol.2
, pp. 451
-
-
Knuth, D.E.1
-
15
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
New York:
-
A. Fiat and A. Shamir, “How to prove yourself: Practical solutions to identification and signature problems,” in Advances in Cryptology—CRYPTO’86, Lecture Notes in Computer Science, vol. 263. New York: 1987, 186–194.
-
(1987)
Advances in Cryptology–CRYPTO'86, Lecture Notes in Computer Science
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
16
-
-
33746255697
-
Performance analysis of server-aided secret computation protocols for the RSA cryptosystem
-
S. Kawamura and A. Shimbo, “Performance analysis of server-aided secret computation protocols for the RSA cryptosystem,” Trans. IEICE Japan, vol. E73, no. 7, pp. 1073–1080, 1990.
-
(1990)
Trans. IEICE Japan
, vol.E73
, Issue.7
, pp. 1073-1080
-
-
Kawamura, S.1
Shimbo, A.2
-
17
-
-
0025471436
-
A factorization attack on certain server-aided computation protocols for the RSA secret transformation
-
Aug.
-
A. Shimbo and S. Kawamura, “A factorization attack on certain server-aided computation protocols for the RSA secret transformation,” Electron. Len., vol. 26, no. 17, pp. 1387-1388, Aug. 1990.
-
(1990)
Electron. Len
, vol.26
, Issue.17
, pp. 1387-1388
-
-
Shimbo, A.1
Kawamura, S.2
-
18
-
-
0343592915
-
Attacks on protocols for server-aided RSA computation
-
New York: Springer-Verlag, Jan.
-
B. Pfitzmann and M. Waidner, “Attacks on protocols for server-aided RSA computation,” in EUROCRYPT92 Abstract, Balatonfured, Hungary; to appear in Lecture Notes in Computer Science. New York: Springer-Verlag, Jan. 1992.
-
(1992)
EUROCRYPT92 Abstract, Balatonfured, Hungary; to appear in Lecture Notes in Computer Science
-
-
Pfitzmann, B.1
Waidner, M.2
-
19
-
-
0020194569
-
Fast decipherment algorithm for RSA public-key cryptosystem
-
Oct.
-
J.J. Quisquater and C. Couvreuer, “Fast decipherment algorithm for RSA public-key cryptosystem,” Electron. Lett., vol. 18, no. 21, pp. 905–907, Oct. 1982.
-
(1982)
Electron. Lett
, vol.18
, Issue.21
, pp. 905-907
-
-
Quisquater, J.J.1
Couvreuer, C.2
|