-
1
-
-
84947912228
-
On-line secret sharing
-
BOYD, C. (Ed.): 'Cryptography and coding'
-
CACHIN, C: 'On-line secret sharing', in BOYD, C. (Ed.): 'Cryptography and coding'. Lect. Notes Comput. Sci., 1025 1994, pp. 190-198
-
(1994)
Lect. Notes Comput. Sci.
, vol.1025
, pp. 190-198
-
-
Cachin, C.1
-
2
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
GOLDREICH, O., MICALI, S., and WIDGERSON, A.: 'How to play any mental game or a completeness theorem for protocols with honest majority'. Proc. 19th Annual Symp. Theory of Computing (STOC), 1987, pp. 218-229
-
(1987)
Proc. 19th Annual Symp. Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Widgerson, A.3
-
3
-
-
0019634370
-
Password authentication with insecure communication
-
LAMPORT, L.: 'Password authentication with insecure communication', Commun. ACM., 1981, 24, pp. 770-772
-
(1981)
Commun. ACM.
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
4
-
-
84947597805
-
Towards the equivalence of breaking the Diffie-Hellman protocol and discrete logarithms
-
DESMEDT, Y.G. (Ed.): 'Advances in cryptography - Crypto '94'
-
MAURER, U.M.: 'Towards the equivalence of breaking the Diffie-Hellman protocol and discrete logarithms', in DESMEDT, Y.G. (Ed.): 'Advances in cryptography - Crypto '94'. Lect. Notes Comput. Sci., 839, 1994, pp.271-281
-
(1994)
Lect. Notes Comput. Sci.
, vol.839
, pp. 271-281
-
-
Maurer, U.M.1
-
5
-
-
0017018484
-
New directions in cryptography
-
DIFFIE, W., and HELLMAN, M.E.: 'New directions in cryptography', IEEE Trans. Inf. Theory, 1976, IT-22, pp. 644-654
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
6
-
-
84864708144
-
Multiparty computations ensuring privacy of each party's input and correctness of the result
-
POMERANCE, C. (Ed.): 'Advances in cryptography - Crypto '87'
-
CHAUM, D., DAMGÅRD, I.B., and VAN DE GRAAF, J.: 'Multiparty computations ensuring privacy of each party's input and correctness of the result', in POMERANCE, C. (Ed.): 'Advances in cryptography - Crypto '87', Lect. Notes Comput. Sci., 297, 1988, pp.87-119
-
(1988)
Lect. Notes Comput. Sci.
, vol.297
, pp. 87-119
-
-
Chaum, D.1
Damgård, I.B.2
Van De Graaf, J.3
-
7
-
-
0025056443
-
A discrete logarithm implementation of perfect zero-knowledge blobs
-
BOSAR, J.F., KURTZ, S.A., and KRENTEL, M.W.: 'A discrete logarithm implementation of perfect zero-knowledge blobs', J. Cryptol., 1990, 2, pp. 63-76
-
(1990)
J. Cryptol.
, vol.2
, pp. 63-76
-
-
Bosar, J.F.1
Kurtz, S.A.2
Krentel, M.W.3
-
9
-
-
0027720973
-
LUC - A new public key system
-
SMITH, P.J., and LENNON, M.J.J.: 'LUC - a new public key system', IFIP Trans. (A) Comput. Sci. Tech., 1993, 37, pp. 103-117
-
(1993)
IFIP Trans. (A) Comput. Sci. Tech.
, vol.37
, pp. 103-117
-
-
Smith, P.J.1
Lennon, M.J.J.2
-
10
-
-
85015402934
-
Use of elliptic curves in cryptography
-
WILLIAMS. H.C.: 'Advances in cryptology - Crypto '85'
-
MILLER, V.S.: 'Use of elliptic curves in cryptography', in WILLIAMS. H.C.: 'Advances in cryptology - Crypto '85'. Lect. Notes Comput. Sci., 218, 1986, pp.417-426
-
(1986)
Lect. Notes Comput. Sci.
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
|