-
3
-
-
84880899710
-
Secure and efficient asynchronous broadcast protocols (extended abstract)
-
In J. Kilian, editor; Springer
-
C. Cachin, K. Kursawe, F. Petzold, and V. Shoup. Secure and efficient asynchronous broadcast protocols (extended abstract). In J. Kilian, editor, CRYPTO 2001, volume 2139 of LNCS, pages 524-541. Springer, 2001.
-
(2001)
CRYPTO 2001, Volume 2139 of LNCS
, pp. 524-541
-
-
Cachin, C.1
Kursawe, K.2
Petzold, F.3
Shoup, V.4
-
5
-
-
0342880858
-
Studies in secure multiparty computation and applications
-
PhD thesis, Weizmann Institute
-
R. Canetti. Studies in Secure Multiparty Computation and Applications. PhD thesis, Weizmann Institute, 1995.
-
(1995)
-
-
Canetti, R.1
-
6
-
-
0013001552
-
Proactive security: Long-term protection against break-ins
-
R. Canetti, R. Gennaro, A. Herzberg, and D. Naor. Proactive security: Long-term protection against break-ins. RSA Laboratories' CryptoBytes, 3(1), 1997.
-
(1997)
RSA Laboratories' CryptoBytes
, vol.3
, Issue.1
-
-
Canetti, R.1
Gennaro, R.2
Herzberg, A.3
Naor, D.4
-
7
-
-
0031619016
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In Proc. 30th Annual ACM Symp. on Theory of Computing, pages 209-218, 1998.
-
(1998)
Proc. 30th Annual ACM Symp. on Theory of Computing
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
8
-
-
4944253148
-
Maintaining authenticated communication in the presence of break-ins
-
R. Canetti, S. Halevi, and A. Herzberg. Maintaining authenticated communication in the presence of break-ins. J. Cryptology, 13(1):61-106, 2000.
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 61-106
-
-
Canetti, R.1
Halevi, S.2
Herzberg, A.3
-
11
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. In Proc. 26th IEEE Symp. on Found. of Computer Science, pages 383-395, 1985.
-
(1985)
Proc. 26th IEEE Symp. on Found. of Computer Science
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
13
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
Apr.
-
M. J. Fischer, N. A. Lynch, and M. S. Paterson. Impossibility of distributed consensus with one faulty process. J. ACM, 32(2):374-382, Apr. 1985.
-
(1985)
J. ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Paterson, M.S.3
-
14
-
-
49049089688
-
Secure key generation for discrete-log based cryptosystems
-
In J. Stern, editor; Springer
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure key generation for discrete-log based cryptosystems. In J. Stern, editor, EUROCRYPT'99, volume 1592 of LNCS, pages 295-310. Springer, 1999.
-
(1999)
EUROCRYPT'99, Volume 1592 of LNCS
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
15
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Feb.
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. Computing, 18(1):186-208, Feb. 1989.
-
(1989)
SIAM J. Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
16
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Apr.
-
S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, 17(2):281-308, Apr. 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
17
-
-
0003070483
-
Fault-tolerant broadcasts and related problems
-
In S. J. Mullender, editor; ACM Press & Addison-Wesley, New York
-
V. Hadzilacos and S. Toueg. Fault-tolerant broadcasts and related problems. In S. J. Mullender, editor, Distributed Systems. ACM Press & Addison-Wesley, New York, 1993.
-
(1993)
Distributed Systems
-
-
Hadzilacos, V.1
Toueg, S.2
-
18
-
-
84957626176
-
Proactive secret sharing or how to cope with perpetual leakage
-
In D. Coppersmith, editor; Springer
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing or how to cope with perpetual leakage. In D. Coppersmith, editor, CRYPTO '95, volume 963 of LNCS, pages 339-352. Springer, 1995.
-
(1995)
CRYPTO '95, Volume 963 of LNCS
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
19
-
-
84976699318
-
The Byzantine generals problem
-
July
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Trans. on Programming Languages and Systems, 4(3):382-401, July 1982.
-
(1982)
ACM Trans. on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
21
-
-
84976810569
-
Reaching agreement in the presence of faults
-
Apr.
-
M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. J. ACM, 27(2):228-234, Apr. 1980.
-
(1980)
J. ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
22
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
In J. Feigenbaum, editor; Springer
-
T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, CRYPTO '91, volume 576 of LNCS, pages 129-140. Springer, 1992.
-
(1992)
CRYPTO '91, Volume 576 of LNCS
, pp. 129-140
-
-
Pedersen, T.P.1
-
23
-
-
84948954277
-
Practical threshold signatures
-
In B. Preneel, editor; Springer
-
V. Shoup. Practical threshold signatures. In B. Preneel, editor, EUROCRYPT 2000, volume 1087 of LNCS, pages 207-220. Springer, 2000.
-
(2000)
EUROCRYPT 2000, Volume 1087 of LNCS
, pp. 207-220
-
-
Shoup, V.1
-
24
-
-
0037952468
-
Towards Fault-Tolerant and Secure On-Line Services
-
PhD thesis, Cornell University, USA
-
L. Zhou. Towards fault-tolerant and secure on-line services. PhD thesis, Cornell University, USA, 2001.
-
(2001)
-
-
Zhou, L.1
|