-
2
-
-
84957713601
-
Verifiable partial key escrow
-
Earlier version Technical Report CS95-447, Department of Computer Science and Engineering, University of California at San Diego, October
-
M. Bellare, S. Goldwasser, Verifiable partial key escrow, Fourth Annual Conference on Computer and Communications Security, 1997, Earlier version Technical Report CS95-447, Department of Computer Science and Engineering, University of California at San Diego, October 1995.
-
(1995)
Fourth Annual Conference on Computer and Communications Security
-
-
Bellare, M.1
Goldwasser, S.2
-
3
-
-
84947778144
-
The decision Diffie-Hellman problem
-
Third Algorithmic Number Theory Symposium, Springer, Berlin
-
D. Boneh, The decision Diffie-Hellman problem, Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science, Vol. 1423, Springer, Berlin, 1998, pp. 48-63.
-
(1998)
Lecture Notes in Computer Science
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
-
4
-
-
85001025766
-
Wallet databases with observers
-
Advances in Cryptology - CRYPTO '92, Springer, Berlin
-
D. Chaum, T.P. Pedersen, Wallet databases with observers. Advances in Cryptology - CRYPTO '92, Lecture Notes in Computer Science, Vol. 740, Springer, Berlin, 1993, pp. 89-105.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
5
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Advances in Cryptology - CRYPTO '94, Springer, Berlin
-
R. Cramer, I. Damgård, B. Schoenmakers, Proofs of partial knowledge and simplified design of witness hiding protocols, Advances in Cryptology - CRYPTO '94, Lecture Notes in Computer Science, Vol. 839, Springer, Berlin, 1994, pp. 174-187.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
6
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory. 31:1985;469-472.
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
7
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Advances in Cryptology - CRYPTO '86, Springer, New York
-
A. Fiat, A. Shamir, How to prove yourself: Practical solutions to identification and signature problems, Advances in Cryptology - CRYPTO '86, Lecture Notes in Computer Science, Vol. 263, Springer, New York, 1987, pp. 186-194.
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
8
-
-
0023545076
-
How to play any mental game - Or - A completeness theorem for protocols with honest majority
-
ACM, New York
-
O. Goldreich, S. Micali, A. Wigderson, How to play any mental game - or - a completeness theorem for protocols with honest majority, Proceedings of 19th Symposium on Theory of Computing (STOC'87), ACM, New York, 1987, pp. 218-229.
-
(1987)
Proceedings of 19th Symposium on Theory of Computing (stoc'87)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
10
-
-
84955606093
-
Proving without knowing: On oblivious, agnostic and blindfolded provers
-
Advances in Cryptology - CRYPTO '96, Springer, Berlin
-
M. Jakobsson, M. Yung, Proving without knowing: On oblivious, agnostic and blindfolded provers, Advances in Cryptology - CRYPTO '96, Lecture Notes in Computer Science, Vol. 1109, Springer, Berlin, 1996, pp. 186-200.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 186-200
-
-
Jakobsson, M.1
Yung, M.2
-
11
-
-
84875762817
-
Provably secure and practical identification schemes and corresponding signature schemes
-
Advances in Cryptology - CRYPTO '92, Springer, Berlin
-
T. Okamoto, Provably secure and practical identification schemes and corresponding signature schemes, Advances in Cryptology - CRYPTO '92, Lecture Notes in Computer Science, Vol. 740, Springer, Berlin, 1993, pp. 31-53.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
13
-
-
84927727752
-
Security proofs for signature schemes
-
Advances in Cryptology - EUROCRYPT '96, Springer, Berlin
-
D. Pointcheval, J. Stern, Security proofs for signature schemes, Advances in Cryptology - EUROCRYPT '96, Lecture Notes in Computer Science, Vol. 1070, Springer, Berlin, 1996, pp. 387-398.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
16
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr C.P. Efficient signature generation by smart cards. J. Cryptol. 4(3):1991;161-174.
-
(1991)
J. Cryptol.
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
17
-
-
0020312165
-
Protocols for secure computations
-
IEEE Computer Society, Silverspring, MD
-
A. Yao, Protocols for secure computations, Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS '82), IEEE Computer Society, Silverspring, MD, 1982, pp. 160-164.
-
(1982)
Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS '82)
, pp. 160-164
-
-
Yao, A.1
-
18
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE Computer Society, Silverspring, MD
-
A. Yao, How to generate and exchange secrets, Proceedings of 27th IEEE Symposium on Foundations of Computer Science (FOCS '86), IEEE Computer Society, Silverspring, MD, 1986, pp. 162-167.
-
(1986)
Proceedings of 27th IEEE Symposium on Foundations of Computer Science (FOCS '86)
, pp. 162-167
-
-
Yao, A.1
-
19
-
-
24244450255
-
-
private communication
-
G. Zémor, private communication, 1998.
-
(1998)
-
-
Zémor, G.1
|