-
2
-
-
84958639277
-
Efficient generation of shared RSA keys
-
volume 1294 of Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
D. Boneh and M. Franklin. Efficient generation of shared RSA keys. In Advances in Cryptology - CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 424-439. Springer-Verlag, Berlin, 1997.
-
(1997)
Advances in Cryptology - CRYPTO '97
, pp. 424-439
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
11244268766
-
-
Private conversation
-
D. Boneh and M. Franklin. Private conversation, 1997.
-
(1997)
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
0007414099
-
On the number of uncanceled elements in the sieve of Eratosthenes
-
N. De Bruijn. On the number of uncanceled elements in the sieve of Eratosthenes. Proc. Nederl. Akad. Wetensch., 53:803-812, 1950.
-
(1950)
Proc. Nederl. Akad. Wetensch.
, vol.53
, pp. 803-812
-
-
De Bruijn, N.1
-
5
-
-
22144433911
-
Split knowledge generation of RSA parameters
-
volume 1355 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, December
-
C. Cocks. Split knowledge generation of RSA parameters. In Proc. Cryptography and Coding: 6th IMA Conference, volume 1355 of Lecture Notes in Computer Science, pages 89-95. Springer-Verlag, Berlin, December 1997.
-
(1997)
Proc. Cryptography and Coding: 6th IMA Conference
, pp. 89-95
-
-
Cocks, C.1
-
6
-
-
0004116989
-
-
MIT Press, Cambridge, MA
-
T. Cormen, C. Leiserson, and R. Rivest. Introduction to Algorithms. MIT Press, Cambridge, MA, 1989.
-
(1989)
Introduction to Algorithms
-
-
Cormen, T.1
Leiserson, C.2
Rivest, R.3
-
7
-
-
0027961556
-
How to share a function securely
-
May
-
A. DeSantis, Y. Desmedt, Y. Frankel, and M. Yung. How to share a function securely. In Proc. 23rd ACM Symposium on the Theory of Computing, pages 522-533, May 1994.
-
(1994)
Proc. 23rd ACM Symposium on the Theory of Computing
, pp. 522-533
-
-
DeSantis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
9
-
-
0024135240
-
Zero-knowledge proofs of identity
-
U. Feige, A. Fiat, and A. Shamir. Zero-knowledge proofs of identity. J. Cryptology, 1:77-94, 1988.
-
(1988)
J. Cryptology
, vol.1
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
10
-
-
84990731886
-
How to prove yourself: Practical schemes to identification and signature problems
-
volume 263 of Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
A. Fiat and A. Shamir. How to prove yourself: practical schemes to identification and signature problems. In Advances in Cryptology - CRYPTO '86, volume 263 of Lecture Notes in Computer Science, pages 186-189. Springer-Verlag, Berlin, 1987.
-
(1987)
Advances in Cryptology - CRYPTO '86
, pp. 186-189
-
-
Fiat, A.1
Shamir, A.2
-
12
-
-
0002992068
-
Joint encryption and message-efficient secure computation
-
M. Franklin and S. Haber. Joint encryption and message-efficient secure computation. J. Cryptology, 9:217-232, 1996.
-
(1996)
J. Cryptology
, vol.9
, pp. 217-232
-
-
Franklin, M.1
Haber, S.2
-
13
-
-
84957104180
-
Two party RSA key generation
-
volume 1666 of Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
N. Gilboa. Two party RSA key generation. In Advances in Cryptology - CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 116-129. Springer-Verlag, Berlin, 1999.
-
(1999)
Advances in Cryptology - CRYPTO '99
, pp. 116-129
-
-
Gilboa, N.1
-
14
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
Springer-Verlag, Berlin
-
L. Guillou and J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In Advances in Cryptology - EUROCRYPT '88, pages 123-128. Springer-Verlag, Berlin, 1988.
-
(1988)
Advances in Cryptology - EUROCRYPT '88
, pp. 123-128
-
-
Guillou, L.1
Quisquater, J.2
-
17
-
-
0026872189
-
Analyzing algorithms by simulation: Variance reduction techniques and simulation speedups
-
June
-
C. C. McGeoch. Analyzing algorithms by simulation: variance reduction techniques and simulation speedups. Comput. Surveys, 24(2): 195-212, June 1992.
-
(1992)
Comput. Surveys
, vol.24
, Issue.2
, pp. 195-212
-
-
McGeoch, C.C.1
-
18
-
-
85031804925
-
A modification of the Fiat-Shamir scheme
-
volume 403 of Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
K. Ohta and T. Okamoto. A modification of the Fiat-Shamir scheme. In Advances in Cryptology -CRYPTO '88, volume 403 of Lecture Notes in Computer Science, pages 232-243. Springer-Verlag, Berlin, 1990.
-
(1990)
Advances in Cryptology -CRYPTO '88
, pp. 232-243
-
-
Ohta, K.1
Okamoto, T.2
-
19
-
-
33745972475
-
Fast signature generation with a Fiat-Shamir-like scheme
-
Springer-Verlag, Berlin
-
H. Ong and C. Schnorr. Fast signature generation with a Fiat-Shamir-like scheme. In Advances in Cryptology - EUROCRYPT '90, pages 432-440. Springer-Verlag, Berlin, 1991.
-
(1991)
Advances in Cryptology - EUROCRYPT '90
, pp. 432-440
-
-
Ong, H.1
Schnorr, C.2
-
20
-
-
84947809931
-
Generation of shared RSA keys by two parties
-
volume 1514 of Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
G. Poupard and J. Stern. Generation of shared RSA keys by two parties. In Advances in Cryptology - AISACRYPT '98, volume 1514 of Lecture Notes in Computer Science, pages 11-24. Springer-Verlag, Berlin, 1998.
-
(1998)
Advances in Cryptology - AISACRYPT '98
, pp. 11-24
-
-
Poupard, G.1
Stern, J.2
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Feb.
-
R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Comm. ACM, 21:120-126, Feb. 1978.
-
(1978)
Comm. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
|