-
1
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
[BCC]
-
[BCC] G. Brassard, D. Chaum, and C. Crepeau. Minimum disclosure proofs of knowledge. J. Comput. System Sei, 37(2) 156-189,1988.
-
J. Comput. System Sei, 37(2) 156-189,1988.
-
-
-
2
-
-
84958769452
-
Convertible undeniable signatures. in A. J. Menezes and S. Vanstone, editors, a
-
[BCDP]
-
[BCDP] J. Boyar, D. Chaum, I. Damgard, and T. Pedersen. Convertible undeniable signatures. In A. J. Menezes and S. Vanstone, editors, A avances in Cryptology -Crypto '90, pages 189-205. Springer-Verlag, Berlin, 1990. Lecture Notes in Computer Science No. 537.
-
Avances in Cryptology -Crypto '90, Pages 189-205. Springer-Verlag, Berlin, 1990. Lecture Notes in Computer Science No. 537.
-
-
Boyar, J.1
Chaum, D.2
Damgard, I.3
Pedersen, T.4
-
3
-
-
84958639277
-
Efficient generation of shared RSA keys. in B. Kaliski, editor
-
[BF]
-
[BF] D. Boneh and M. Franklin. Efficient generation of shared RSA keys. In B. Kaliski, editor. Advances in Cryptology -Crypto '97, pages 425-439. Springer-Verlag, Berlin, 1997. Notes in Computer Science No. 1294.
-
Advances in Cryptology -Crypto '97, Pages 425-439. Springer-Verlag, Berlin, 1997. Notes in Computer Science No. 1294.
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
84898960610
-
Completeness theorems for noncryptographic faulttolerant distributed computations. in
-
[BGW]
-
[BGW] M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic faulttolerant distributed computations. In Prvc. 20th Annual Symp. on the Theory of Computing, pages 1-10. ACM, New York, 1988.
-
Prvc. 20th Annual Symp. on the Theory of Computing, Pages 1-10. ACM, New York, 1988.
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
33745983920
-
-
[Bo] C. Boyd. Digital multisignatures. In H. Baker and F. Piper, editors. Cryptography and Coding, pages 241-246. Claredon Press, Oxford, 1989.
-
Cryptography and Coding, Pages 241-246. Claredon Press, Oxford, 1989.
-
-
Boyd, C.1
Baker, D.M.I.2
Piper Editors, F.3
-
7
-
-
84948986458
-
Optimal asymmetric encryption. in A. De Santis, editor
-
[BR]
-
[BR] M. Bellare and P. Rogaway. Optimal asymmetric encryption. In A. De Santis, editor, Advances in Cryptology -Eurocrypt '94, pages 92-111. Springer-Verlag, Berlin, 1994. Lecture Notes in Computer Science No. 950.
-
Advances in Cryptology -Eurocrypt '94, Pages 92-111. Springer-Verlag, Berlin, 1994. Lecture Notes in Computer Science No. 950.
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
33746025975
-
Undeniable signatures. in G. Brassard, editor
-
[CA]
-
[CA] D. Chaum and H. Van Antwerpen. Undeniable signatures. In G. Brassard, editor, Advances in Cryptology-Crypto '89, pages212-217. Springer- Verlag, Berlin, 1989. Lecture Notes in Computer Science No. 435.
-
Advances in Cryptology-Crypto '89, Pages212-217. Springer- Verlag, Berlin, 1989. Lecture Notes in Computer Science No. 435.
-
-
Chaum, D.1
Van Antwerpen, H.2
-
9
-
-
84898947315
-
Multiparty unconditionally secure protocols. in
-
[CCD]
-
[CCD] D. Chaum, C. Crepeau, and I. Damgard. Multiparty unconditionally secure protocols. In Proc. 20th Annual Symp. on the Theory of Computing, pages 11-19. ACM, New York, 1988.
-
Proc. 20th Annual Symp. on the Theory of Computing, Pages 11-19. ACM, New York, 1988.
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
10
-
-
85023982750
-
An improved protocol for demonstrating possession of a discrete logarithm and some generalizations. in D. Chaum, editor
-
[CEG]
-
[CEG] D. Chaum, J.-H. Evertse, and J. van der Graaf. An improved protocol for demonstrating possession of a discrete logarithm and some generalizations. In D. Chaum, editor, Advances in Cryptology Eurocrypt '87, pages 127-141. Springer-Verlag, Berlin, 1987. Lecture Notes in Computer Science No. 304.
-
Advances in Cryptology Eurocrypt '87, Pages 127-141. Springer-Verlag, Berlin, 1987. Lecture Notes in Computer Science No. 304.
-
-
Chaum, D.1
Evertse, J.-H.2
Van Der Graaf, J.3
-
11
-
-
85043778396
-
Zero-knowledge undeniable signatures. in I. Damgard, editor
-
[Ch]
-
[Ch] D. Chaum. Zero-knowledge undeniable signatures. In I. Damgard, editor, Advances in Cryptology -Eurocrypt '90, pages 458-464. Springer-Verlag, Berlin, 1990. Lecture Notes in Computer Science No. 473.
-
Advances in Cryptology -Eurocrypt '90, Pages 458-464. Springer-Verlag, Berlin, 1990. Lecture Notes in Computer Science No. 473.
-
-
Chaum, D.1
-
12
-
-
33746000782
-
Public-key cryptography and re-usable shared secrets. in H. Baker and F. Piper, editors
-
[CH]
-
[CH] R. A. Croft and S. P. Harris. Public-key cryptography and re-usable shared secrets. In H. Baker and F. Piper, editors, Cryptography and Coding, pages 189-201. Claredon Press, Oxford, 1989.
-
Cryptography and Coding, Pages 189-201. Claredon Press, Oxford, 1989.
-
-
Croft, R.A.1
Harris, S.P.2
-
14
-
-
0027961556
-
How to share a function securely. in
-
[DDFY]
-
[DDFY] A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung. How to share a function securely. In Proc. 26th Annual Symp. on the Theory of Computing, pages 522-533. ACM, New York, 1994.
-
Proc. 26th Annual Symp. on the Theory of Computing, Pages 522-533. ACM, New York, 1994.
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
15
-
-
0008538346
-
A further weakness in the common modulus protocol for RSA cryptosytems
-
[DeL]
-
[DeL] J. M. DeLaurentis. A further weakness in the common modulus protocol for RSA cryptosytems. Cryptologia, (8)253-259, 1984.
-
Cryptologia, (8)253-259, 1984.
-
-
Delaurentis, J.M.1
-
16
-
-
85032188633
-
Society and group oriented cryptography a new concept. in C. Pomerance, editor
-
[Des1]
-
[Des1] Y. Desmedt. Society and group oriented cryptography a new concept. In C. Pomerance, editor, Advances in Cryptology -Crypto '87, pages 120-127. Springer-Verlag, Berlin, 1987. Lecture Notes in Computer Science No. 293.
-
Advances in Cryptology -Crypto '87, Pages 120-127. Springer-Verlag, Berlin, 1987. Lecture Notes in Computer Science No. 293.
-
-
Desmedt, Y.1
-
18
-
-
85023809951
-
Threshold cryptoSystems. in G. Brassard, editor
-
[DF1]
-
[DF1] Y. Desmedt and Y. Frankel. Threshold cryptoSystems. In G. Brassard, editor. Advances in Cryptology - Crypta '89, pages 307-315. Springer-Verlag, Berlin, 1989. Lecture Notes in Computer Science No. 435.
-
Advances in Cryptology - Crypta '89, Pages 307-315. Springer-Verlag, Berlin, 1989. Lecture Notes in Computer Science No. 435.
-
-
Desmedt, Y.1
Frankel, Y.2
-
19
-
-
85022187530
-
Shared generation of authenticators and signatures. in J. Feigenbaum, editor
-
[DF2]
-
[DF2] Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures. In J. Feigenbaum, editor, Advances in Cryptology-Crypto '91, pages 457-469. Springer-Verlag, Berlin, 1991. Lecture Notes in Computer Science No. 576.
-
Advances in Cryptology-Crypto '91, Pages 457-469. Springer-Verlag, Berlin, 1991. Lecture Notes in Computer Science No. 576.
-
-
Desmedt, Y.1
Frankel, Y.2
-
20
-
-
0031375570
-
Optimal resilience proactive public-key cryptosystems. in
-
[FGMY]
-
[FGMY] Y. Frankel, P. Gemmell, P. Mackenzie, and M. Yung, Optimal resilience proactive public-key cryptosystems. In Proc. 38//i Annual Symp. on Foundations of Computer Science, pages 384-393. IEEE, New York, 1997.
-
Proc. 38//i Annual Symp. on Foundations of Computer Science, Pages 384-393. IEEE, New York, 1997.
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
21
-
-
0029713931
-
Witness-based cryptographic program checking and robust function sharing. in
-
[FGY]
-
[FGY] Y. Frankel, P. Gemmell, and M. Yung. Witness-based cryptographic program checking and robust function sharing. In Proc. 28/ft Annual Symp. on the Tlieory of Computing, pages 499-508. ACM, New York,1996.
-
Proc. 28/ft Annual Symp. on the Tlieory of Computing, Pages 499-508. ACM, New York,1996.
-
-
Frankel, Y.1
Gemmell, P.2
Yung, M.3
-
22
-
-
84949189366
-
Secure distributed storage and retrieval. in M. Mavronicolas and P. Tsigas, editors
-
[GGJR]
-
[GGJR] J. Garay, R. Gennaro, C. Jutla, and T. Rabin. Secure distributed storage and retrieval. In M. Mavronicolas and P. Tsigas, editors, Proc. 11 th International Workshop, WDAG '97, pages 275-289. Springer-Verlag, Berlin, 1997. Lecture Notes in Computer Science No. 1320.
-
Proc. 11 Th International Workshop, WDAG '97, Pages 275-289. Springer-Verlag, Berlin, 1997. Lecture Notes in Computer Science No. 1320.
-
-
Garay, J.1
Gennaro, R.2
Jutla, C.3
Rabin, T.4
-
23
-
-
84947441722
-
Robust and efficient sharing of RSA functions. in N. Koblitz, editor
-
[GJKR1]
-
[GJKR1] R. Gennaro, S. Jarecki, H. Krawczyk, andT. Rabin. Robust and efficient sharing of RSA functions. In N. Koblitz, editor, Advances in Cryptology-Crypto '96, pages 157-172. Springer-Verlag, Berlin, 1996. Lecture Notes in Computer Science No. 1109.
-
Advances in Cryptology-Crypto '96, Pages 157-172. Springer-Verlag, Berlin, 1996. Lecture Notes in Computer Science No. 1109.
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
24
-
-
84947926543
-
Robust threshold DSS signatures. in U. Maurer, editor
-
[GJKR2]
-
[GJKR2] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In U. Maurer, editor, Advances in Cryptology -Eurocrypt '96, pages 354-371. Springer-Verlag, Berlin, 1996. Lecture Notes in Computer Science No. 1070.
-
Advances in Cryptology -Eurocrypt '96, Pages 354-371. Springer-Verlag, Berlin, 1996. Lecture Notes in Computer Science No. 1070.
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
25
-
-
84958670348
-
RSA-based undeniable signatures. in B. Kaliski, editor
-
[GKR]
-
[GKR] R. Gennaro, H. Krawczyk, and T. Rabin. RSA-based undeniable signatures. In B. Kaliski, editor, Advances in Cryptology-Crypto '97, pages 132-149. Springer-Verlag, Berlin, 1997. Lecture Notes in Computer Science No. 1294.
-
Advances in Cryptology-Crypto '97, Pages 132-149. Springer-Verlag, Berlin, 1997. Lecture Notes in Computer Science No. 1294.
-
-
Gennaro, R.1
Krawczyk, H.2
Rabin, T.3
-
30
-
-
0023545076
-
How to play any mental game. in
-
[GMW1]
-
[GMW1] O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proc. 19th Annual Symp. on the Theory of Computing, pages 218-229. ACM, New York, 1987.
-
Proc. 19th Annual Symp. on the Theory of Computing, Pages 218-229. ACM, New York, 1987.
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
33
-
-
85028758941
-
Fair public-key cryptosystems. in E. Brickell, editor
-
[Mi]
-
[Mi] S. Micali. Fair public-key cryptosystems. In E. Brickell, editor, Advances in Cryptology -Crypto '92, pages 113-138. Springer-Verlag, Berlin, 1992. Lecture Notes in Computer Science No. 740.
-
Advances in Cryptology -Crypto '92, Pages 113-138. Springer-Verlag, Berlin, 1992. Lecture Notes in Computer Science No. 740.
-
-
Micali, S.1
-
34
-
-
84974655726
-
Secure computation. in J. Feigenbaum, editor
-
[MR]
-
[MR] S. Micali and P. Rogaway. Secure computation. In J. Feigenbaum, editor, Advances in Cryptology - Crypto '91, pages 392-404. Springer-Verlag, Berlin, 1991. Lecture Notes in Computer Science No. 576.
-
Advances in Cryptology - Crypto '91, Pages 392-404. Springer-Verlag, Berlin, 1991. Lecture Notes in Computer Science No. 576.
-
-
Micali, S.1
Rogaway, P.2
-
35
-
-
84982943258
-
Noninteractive and information-theoretic secure verifiable secret sharing. in J. Feigenbaum, editor
-
[Pe]
-
[Pe] T. Pedersen. Noninteractive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, Advances in Cryptology -Crypto '91, pages 129-140. Springer-Verlag, Berlin, 1991. Lecture Notes in Computer Science No. 576.
-
Advances in Cryptology -Crypto '91, Pages 129-140. Springer-Verlag, Berlin, 1991. Lecture Notes in Computer Science No. 576.
-
-
Pedersen, T.1
|