-
2
-
-
84947770625
-
Efficient dynamic-resharing "verifiable secret sharing" against mobile adversary
-
Springer Verlag LNCS
-
N. Alon, Z. Galil and M. Yung, Efficient Dynamic-Resharing "Verifiable Secret Sharing" Against Mobile Adversary, European Symp. on Algorithms (ESA 95), Springer Verlag LNCS 979, 1995.
-
(1995)
European Symp. on Algorithms (ESA 95)
, vol.979
-
-
Alon, N.1
Galil, Z.2
Yung, M.3
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway, Random Oracles are Practical: a paradigm for designing efficient protocols, ACM, 1-st Comp. and Com. Sec. 1993.
-
(1993)
ACM, 1-st Comp. and Com. Sec
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
5244241001
-
Designing programs to check their work
-
M. Blum, Designing programs to check their work, ICSI technical report TR-88-009.
-
ICSI Technical Report
-
-
Blum, M.1
-
5
-
-
0026405370
-
Checking the correctness of memories
-
October
-
M. Blum, W. Evans, P. Gemmell, S. Kannan, M. Naor. Checking the Correctness of Memories. In the 32nd Annual Foundations of Computer Science Conference, pp 90-99, October 1991.
-
(1991)
The 32nd Annual Foundations of Computer Science Conference
, pp. 90-99
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
6
-
-
0000619172
-
Self testing/correcting with applications to numerical problems
-
M. Blum, M. Luby, and R. Rubinfeld, Self testing/correcting with applications to numerical problems, Journal of Computer and Systems Science, Vol 47, pp. 549-595, 1993.
-
(1993)
Journal of Computer and Systems Science
, vol.47
, pp. 549-595
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
-
12
-
-
0027961556
-
How to share a function securely
-
A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung, How to Share a Function Securely, Proceedings of the ACM Symp. on the Theory of Computing (STOC), pp. 522-533, 1994.
-
(1994)
Proceedings of the ACM Symp. on the Theory of Computing (STOC)
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
13
-
-
85023809951
-
-
Springer-Verlag LNCS
-
Y. Desmedt and Y. Frankel, Threshold cryptosystems, Crypto'89, Springer-Verlag LNCS 435, 1990, pp. 307-315.
-
(1990)
Threshold Cryptosystems, Crypto'89
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
14
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. Fiat and A. Shamir, "How to prove yourself: practical solutions to identification and signature problems", Crypto'86, pp. 186-194.
-
Crypto'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
15
-
-
0343242780
-
-
FIPS PUB 185, Feb, Dept. of Commerce
-
FIPS PUB 185, Escrowed Encryption Standard Feb. 1994. (Dept. of Commerce).
-
(1994)
Escrowed Encryption Standard
-
-
-
16
-
-
0039241746
-
A practical protocol for large group oriented networks
-
Y. Frankel, "A practical protocol for large group oriented networks", Advances in cryptology, Proc. of Eurocrypt 89. pp. 56-61.
-
Advances in Cryptology, Proc. of Eurocrypt
, vol.89
, pp. 56-61
-
-
Frankel, Y.1
-
18
-
-
0345979181
-
On the composition of zero-knowledge proof systems
-
O. Goldreich and H. Krawczyk, On the Composition of Zero-Knowledge Proof Systems, ICALP 1990.
-
(1990)
ICALP
-
-
Goldreich, O.1
Krawczyk, H.2
-
19
-
-
71149116146
-
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
-
O. Goldreich, S. Micali, and A. Wigderson, Proofs that Yield Nothing but Their Validity and a Methodology of Cryptographic Protocol Design, J. of the ACM, v. 38, 1991, pp. 691-729.
-
(1991)
J. of the ACM
, vol.38
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
20
-
-
0024611659
-
The knowledge complexity of interactive proof-systems
-
S. Goldwasser, S. Micali, and C. Rackoff, The Knowledge Complexity of Interactive Proof-Systems, SIAM J. on Computing, v. 18(1), 1989.
-
(1989)
SIAM J. on Computing
, vol.18
, Issue.1
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
21
-
-
85028775577
-
Direct minimum knowledge computations
-
Springer Verlag LNCS
-
R. Impagliazzo, and M. Yung, Direct Minimum Knowledge Computations, Crypto-87, Springer Verlag LNCS, pp. 40-51.
-
Crypto-87
, pp. 40-51
-
-
Impagliazzo, R.1
Yung, M.2
-
22
-
-
0003013846
-
New directions in testing, distributed comput. and cryptography
-
R. Lipton, New directions in testing, distributed comput. and cryptography DIMACS series in Dis. Math and Th. Comp. Sci. vol 2, 1991, 191-202.
-
(1991)
DIMACS Series in Dis. Math and Th. Comp. Sci
, vol.2
, pp. 191-202
-
-
Lipton, R.1
-
24
-
-
0028429699
-
How to securely replicate services
-
May
-
M. Reiter and K. Birman, How to securely replicate services, ACM Trans, on Progr. Languages and Systems, 16(3), May 1994, pp. 986-1009.
-
(1994)
ACM Trans, on Progr. Languages and Systems
, vol.16
, Issue.3
, pp. 986-1009
-
-
Reiter, M.1
Birman, K.2
-
25
-
-
0012785603
-
-
Ph. D. Thesis, Univ. of California, Berkeley
-
R. Rubinfeld, A mathematical theory of self-checking, self-testing and self-correcting programs, Ph. D. Thesis, Univ. of California, Berkeley, 1990.
-
(1990)
A Mathematical Theory of Self-checking, Self-testing and Self-correcting Programs
-
-
Rubinfeld, R.1
|