-
2
-
-
0011960231
-
Partial key escrow: A new approach to software key escrow
-
Washington
-
Shamir, A. , Partial key escrow: a new approach to software key escrow, Presented at Key Escrow Conference, Washington, 1995.
-
(1995)
Key Escrow Conference
-
-
Shamir, A.1
-
3
-
-
84947439162
-
A key escrow system with warrant bounds
-
LNCS963, Berlin: Springer-Verlag
-
Lenstra, A. K. , Winkler, P. , Yacobi, Y. , A key escrow system with warrant bounds, Advances in Cryptology-Crypto'95, LNCS963, Berlin: Springer-Verlag, 1995, 197-207.
-
(1995)
Advances in Cryptology- Crypto'95
, pp. 197-207
-
-
Lenstra, A.K.1
Winkler, P.2
Yacobi, Y.3
-
4
-
-
0342373232
-
Simple method for generating and sharing pseudo-random functions with application to clipper-like key escrow system
-
Berlin: Springer-Verlag
-
Micali, S. , Ney, R. A. , Simple method for generating and sharing pseudo-random functions with application to clipper-like key escrow system, Advances in Cryptology-Crypto'95 , Berlin: Springer-Verlag, 1995, 184-196.
-
(1995)
Advances in Cryptology-Crypto'95
, pp. 184-196
-
-
Micali, S.1
Ney, R.A.2
-
6
-
-
0032258223
-
A new secret sharing threshold scheme and key escrow system
-
Yang Bo, Ma Wenping, Wang Yumin, A new secret sharing threshold scheme and key escrow system, Acta Electronica Sinica, 1998, 26(10):1-3, 8.
-
(1998)
Acta Electronica Sinica
, vol.26
, Issue.10
, pp. 1-3
-
-
Bo, Y.1
Wenping, Ma.2
Yumin, W.3
-
7
-
-
85023809951
-
Threshold Cryptosystems
-
Berlin: Springer-Verlag
-
Desmedt, Y. , Frankel, Y. , Threshold Cryptosystems, In Proc. Crypto'89, Lecture Notes in Computer Science 435, Berlin: Springer-Verlag, 1990, 307-315.
-
(1990)
Proc. Crypto'89, Lecture Notes in Computer Science
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
8
-
-
85022187530
-
Shared Generation of Authenticators and Signatures
-
Berlin: Springer-Verlag
-
Desmedt, Y. , Frankel, Y. , Shared Generation of Authenticators and Signatures, In Proc. Crypto'91, Lecture Notes in Computer Science 576, Berlin: Springer-Verlag, 1992, 457-469.
-
(1992)
Proc. Crypto'91, Lecture Notes in Computer Science
, vol.576
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
9
-
-
0027961556
-
How to share a function securely
-
Santis, A. D. , Desmedt, Y. , Frankel, Y. et al. , How to share a function securely, in Proc . 26th ACM Symp. on Theory of Computing, IEEE, 1994, 522-533.
-
(1994)
Proc . 26th ACM Symp. on Theory of Computing, IEEE
, pp. 522-533
-
-
Santis, A.D.1
Desmedt, Y.2
Frankel, Y.3
-
10
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
Berlin: Springer-Verlag
-
Gennaro, R. , Jarecki, S. , Krawczyk, H. et al. , Robust and efficient sharing of RSA functions, in Proc. Crypto'96, Lecture Notes in Computer Science 1109, Berlin: Springer-Verlag, 1996, 157-172.
-
(1996)
Proc. Crypto'96, Lecture Notes in Computer Science
, vol.1109
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
-
11
-
-
0042689537
-
The multi-dimension RSA and its low exponent security
-
Cao Zhenfu, The multi-dimension RSA and its low exponent security, Science in China, Series E, 2000, 43(4) : 349-354.
-
(2000)
Science in China, Series E
, vol.43
, Issue.4
, pp. 349-354
-
-
Zhenfu, C.1
|