-
2
-
-
84957678021
-
Fast digital identity revocation
-
Berlin, Germany: Springer-Verlag
-
W. Aiello, S. Lodha, and R. Ostrovsky, "Fast digital identity revocation," in Advances in Ctyptology - CRYPTO'98, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1998, vol. 1462, pp. 137-152.
-
(1998)
Advances in Ctyptology - CRYPTO'98, Lecture Notes in Computer Science
, vol.1462
, pp. 137-152
-
-
Aiello, W.1
Lodha, S.2
Ostrovsky, R.3
-
4
-
-
0028482823
-
Checking the correctness of memories
-
M. Blum, W. Evans, P. Gemmell, S. Kannan, and M. Naor, "Checking the correctness of memories," Algorithmica, vol. 12, pp. 225-244, 1994.
-
(1994)
Algorithmica
, vol.12
, pp. 225-244
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
5
-
-
85024585723
-
Incremental cryptography: The case of hashing and signing
-
Berlin, Germany: Springer-Verlag
-
M. Bellare, O. Goldreich, and S. Goldwasser, "Incremental cryptography: The case of hashing and signing," in Advances in Cryptology - CRYPTO'94, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1994, vol. 839, pp. 216-233.
-
(1994)
Advances in Cryptology - CRYPTO'94, Lecture Notes in Computer Science
, vol.839
, pp. 216-233
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
6
-
-
0345350047
-
Incremental cryptography and application to virus protection
-
_, "Incremental cryptography and application to virus protection," in Proc. 27th ACM Symp. Theory Computing, 1995, pp. 45-56.
-
(1995)
Proc. 27th ACM Symp. Theory Computing
, pp. 45-56
-
-
-
7
-
-
84958663551
-
Collision-resistant hashing: Toward making UOWHF's practical
-
Berlin, Germany: Springer-Verlag
-
M. Bellare and P. Rogaway, "Collision-resistant hashing: Toward making UOWHF's practical," in Advances in Cryptology - CRYPTO'97, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1997, vol. 1294, pp. 470-484.
-
(1997)
Advances in Cryptology - CRYPTO'97, Lecture Notes in Computer Science
, vol.1294
, pp. 470-484
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
84947955350
-
Cryptographically strong undeniable signatures, unconditionally secure for the signer
-
Berlin, Germany: Springer-Verlag
-
D. Chaum, E. van Heijst, and B. Pfitzmann, "Cryptographically strong undeniable signatures, unconditionally secure for the signer," in Advances in Cryptology - CRYPTO'91, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1991, vol. 576, pp. 470-484.
-
(1991)
Advances in Cryptology - CRYPTO'91, Lecture Notes in Computer Science
, vol.576
, pp. 470-484
-
-
Chaum, D.1
Van Heijst, E.2
Pfitzmann, B.3
-
10
-
-
0005268716
-
Cryptanalysis of MD4
-
H. Dobbertin, "Cryptanalysis of MD4," J. Cryptol., vol. 11, pp. 253-271, 1998.
-
(1998)
J. Cryptol.
, vol.11
, pp. 253-271
-
-
Dobbertin, H.1
-
11
-
-
84919405348
-
Cryptanalysis of MD5
-
_, "Cryptanalysis of MD5," presented at the Rump Session, 1996, http://www.iacr.org/conferences/ec96/rump.
-
(1996)
Rump Session
-
-
-
12
-
-
0003157491
-
On-line/off-line digital signatures
-
S. Even, O. Goldreich, and S. Micali, "On-line/off-line digital signatures," J. Cryptology, vol. 9, pp. 35-67, 1996.
-
(1996)
J. Cryptology
, vol.9
, pp. 35-67
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
13
-
-
0009583143
-
Collision-free hashing from lattice problems
-
O. Goldreich, S. Goldwasser, and S. Halevi, "Collision-free hashing from lattice problems," ECCC, http://www.eccc.uni-trier.de/eccc/, 1996.
-
(1996)
ECCC
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
15
-
-
0001143795
-
Efficient cryptographic schemes provably as secure as subset sum
-
R. Impagliazzo and M. Naor, "Efficient cryptographic schemes provably as secure as subset sum," J. Cryptol., vol. 9, pp. 199-216, 1996.
-
(1996)
J. Cryptol.
, vol.9
, pp. 199-216
-
-
Impagliazzo, R.1
Naor, M.2
-
16
-
-
0004216472
-
-
ser. series in networking and distributed systems. Englewood Cliffs, NJ: Prentice-Hall
-
C. Kaufman, R. Perlman, and M. Speciner, Network Security. Private Communication in a Public World, ser. series in networking and distributed systems. Englewood Cliffs, NJ: Prentice-Hall, 1995.
-
(1995)
Network Security. Private Communication in a Public World
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
17
-
-
84958063551
-
On certificate revocation and validation
-
Berlin: Springer-Verlag
-
P. Kocher, "On certificate revocation and validation," in Financial Cryptography - FC'98, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1998, vol. 1465, pp. 172-177.
-
(1998)
Financial Cryptography - FC'98, Lecture Notes in Computer Science
, vol.1465
, pp. 172-177
-
-
Kocher, P.1
-
18
-
-
84969346266
-
A certified digital signature
-
Berlin, Germany: Springer-Verlag
-
R. Merkle, "A certified digital signature," in Advances in Cryptology - CRYPTO'89, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1990, vol. 435, pp. 234-246.
-
(1990)
Advances in Cryptology - CRYPTO'89, Lecture Notes in Computer Science
, vol.435
, pp. 234-246
-
-
Merkle, R.1
-
20
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
M. Naor and M. Yung, "Universal one-way hash functions and their cryptographic applications," in Proc. 21st ACM Symp. Theory Computing, 1989, pp. 33-43.
-
(1989)
Proc. 21st ACM Symp. Theory Computing
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
22
-
-
0003629990
-
-
Federal Information Processing Standards Publ. 180
-
Secure hash standard, Federal Information Processing Standards Publ. 180, 1993.
-
(1993)
Secure Hash Standard
-
-
-
23
-
-
0003195066
-
The MD4 message-digest algorithm
-
R. Rivest, "The MD4 message-digest algorithm,", Internet RFC 1320, 1992.
-
(1992)
Internet RFC 1320
-
-
Rivest, R.1
-
24
-
-
0003195066
-
The MD5 message-digest algorithm
-
_, "The MD5 message-digest algorithm,", Internet RFC 1321, 1992.
-
(1992)
Internet RFC 1321
-
-
-
25
-
-
84958042111
-
Can we eliminate certificate revocation lists?
-
Berlin, Germany: Springer-Verlag
-
_, "Can we eliminate certificate revocation lists?," in Financial Cryptography - FC'98, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1998, vol. 1465, pp. 178-183.
-
(1998)
Financial Cryptography - FC'98, Lecture Notes in Computer Science
, vol.1465
, pp. 178-183
-
-
|