-
1
-
-
85034827254
-
On privacy homomorphism
-
Advances in Cryptology - Eurocrypt'87, Spring-Verlag
-
E.F. Brickell and Y. Yacobi, "On privacy homomorphism," Lecture Notes in Computer Science 304, Advances in Cryptology - Eurocrypt'87, pp.117-125, Spring-Verlag, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.304
, pp. 117-125
-
-
Brickell, E.F.1
Yacobi, Y.2
-
2
-
-
85029541173
-
Towards practical public key systems secure against chosen ciphertext attacks
-
Advances in Cryptology - Crypto'91, Spring-Verlag
-
I. Damgård, "Towards practical public key systems secure against chosen ciphertext attacks," Lecture Notes in Computer Science 576, Advances in Cryptology - Crypto'91, pp.445-456, Spring-Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 445-456
-
-
Damgård, I.1
-
3
-
-
77649118700
-
Diffie-Hellman is as strong as discrete log for certain primes
-
Advances in Cryptology - Crypto'88, Spring-Verlag
-
B. den Boer, "Diffie-Hellman is as strong as discrete log for certain primes," Lecture Notes in Computer Science 403, Advances in Cryptology - Crypto'88, pp.530-539, Spring-Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.403
, pp. 530-539
-
-
Den Boer, B.1
-
4
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol.IT-22, no.6, pp.644-645, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-645
-
-
Diffie, W.1
Hellman, M.2
-
5
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithm
-
July
-
T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithm," IEEE Trans. Inf. Theory, vol.IT-31, no.4, pp.469-472, July 1985.
-
(1985)
IEEE Trans. Inf. Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
6
-
-
0028481080
-
A secure broadcast communication method with short messages
-
Aug.
-
M. Mambo, A. Nishikawa, E. Okamoto, and S. Tsujii, "A secure broadcast communication method with short messages," IEICE Trans. Fundamentals, vol.E77-A, no.8, pp.1319-1327, Aug. 1994.
-
(1994)
IEICE Trans. Fundamentals
, vol.E77-A
, Issue.8
, pp. 1319-1327
-
-
Mambo, M.1
Nishikawa, A.2
Okamoto, E.3
Tsujii, S.4
-
7
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
Sept.
-
M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures: Delegation of the power to sign messages," IEICE Trans. Fundamentals, vol.E79-A, no.9, Sept. 1996.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.9
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
9
-
-
85031767993
-
Speeding up secret computation with insecure auxiliary devices
-
Advances in Cryptology - Crypto'88, Spring-Verlag
-
T. Matsumoto, K. Kato, and H. Imai, "Speeding up secret computation with insecure auxiliary devices," Lecture Notes in Computer Science 403, Advances in Cryptology - Crypto'88, pp.497-506, Spring-Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.403
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
10
-
-
33746216662
-
Directly transformed link encryption
-
Nov.
-
T. Matsumoto, T. Okada, and H. Imai, "Directly transformed link encryption," IECE Trans., vol.J65-D, no.11, pp. 1443-1450, Nov. 1982.
-
(1982)
IECE Trans.
, vol.J65-D
, Issue.11
, pp. 1443-1450
-
-
Matsumoto, T.1
Okada, T.2
Imai, H.3
-
11
-
-
84947597805
-
Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
-
Advances in Cryptology - Crypto'94, Spring-Verlag
-
U.M. Maurer, "Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms," Lecture Notes in Computer Science 839, Advances in Cryptology - Crypto'94, pp.271-281, Spring-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 271-281
-
-
Maurer, U.M.1
-
12
-
-
84875762817
-
Provably secure and practical identification schemes and corresponding signature schemes
-
Advances in Cryptology - Crypto'92, Spring-Verlag
-
T. Okamoto, "Provably secure and practical identification schemes and corresponding signature schemes," Lecture Notes in Computer Science 740, Advances in Cryptology - Crypto'92, pp.31-53, Spring-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
13
-
-
0003195066
-
The MD5 message-digest algorithm
-
April
-
R. Rivest, "The MD5 message-digest algorithm," Request for Comments 1321, April 1992.
-
(1992)
Request for Comments
, vol.1321
-
-
Rivest, R.1
-
14
-
-
0005301490
-
On databanks and privacy homomorphisms
-
eds. R.A. Demillo et al., Academic Press
-
R. Rivest, L. Adleman, and M. Dertouzos, "On databanks and privacy homomorphisms," in Foundations of Secure Computation, eds. R.A. Demillo et al., pp.168-177, Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 168-177
-
-
Rivest, R.1
Adleman, L.2
Dertouzos, M.3
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun, of the ACM, vol.21, pp.120-126, 1978.
-
(1978)
Commun, of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
17
-
-
33746255631
-
A factorization attack against some server-aided computation protocols for the RSA secret computation
-
Jan.
-
A. Shimbo and S. Kawamura, "A factorization attack against some server-aided computation protocols for the RSA secret computation," Proc. 1990 Symposium on Cryptography and Information Security, SCIS90-3B, Jan. 1990.
-
(1990)
Proc. 1990 Symposium on Cryptography and Information Security
, vol.SCIS90-3B
-
-
Shimbo, A.1
Kawamura, S.2
-
18
-
-
33746255697
-
Performance analysis of server-aided secret computation protocols
-
July
-
A. Shimbo and S. Kawamura, "Performance analysis of server-aided secret computation protocols," IEICE Trans., V01.E73, no.7, pp.1073-1080, July 1990.
-
(1990)
IEICE Trans.
, vol.E73
, Issue.7
, pp. 1073-1080
-
-
Shimbo, A.1
Kawamura, S.2
-
19
-
-
0023568495
-
Random self-reducibility and zero-knowledge interactive proofs of possession of information
-
M. Tompa and H. Well, "Random self-reducibility and zero-knowledge interactive proofs of possession of information," Proc. of Symp. on Foundation of Computer Science, pp.472-482, 1987.
-
(1987)
Proc. of Symp. on Foundation of Computer Science
, pp. 472-482
-
-
Tompa, M.1
Well, H.2
-
20
-
-
0027612710
-
New digital signature scheme based on discrete logarithm
-
S.M. Yen and C.S. Laih, "New digital signature scheme based on discrete logarithm," Electron. Letters, vol.29, no.12, pp.1120-1121, 1993.
-
(1993)
Electron. Letters
, vol.29
, Issue.12
, pp. 1120-1121
-
-
Yen, S.M.1
Laih, C.S.2
-
21
-
-
85028933312
-
Practical approaches to attaining security against adaptively chosen ciphertext attacks
-
Advances in Cryptology - Crypto'92, Spring-Verlag
-
Y. Zheng and J. Seberry, "Practical approaches to attaining security against adaptively chosen ciphertext attacks," Lecture Notes in Computer Science 740, Advances in Cryptology - Crypto'92, pp.292-304, Spring-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 292-304
-
-
Zheng, Y.1
Seberry, J.2
|