-
1
-
-
0033617058
-
Breaking generalized Diffie Hellman modulo a composite is no easier than factoring
-
Eli Biham, Dan Boneh, and Omer Reingold. Breaking generalized Diffie Hellman modulo a composite is no easier than factoring. Information Processing Letters, 70:83-87, 1999.
-
(1999)
Information Processing Letters
, vol.70
, pp. 83-87
-
-
Biham, E.1
Boneh, D.2
Reingold, O.3
-
3
-
-
84947796723
-
Equitable key escrow with limited time span (or, how to enforce time expiration cryptographically)
-
K. Ohta and D. Pei, editors, Advances in Cryptology - ASIACRYPT '98, number 1514 Springer Verlag, Berlin Germany
-
Mike Burmester, Yvo Desmedt, and Jennifer Seberry. Equitable key escrow with limited time span (or, how to enforce time expiration cryptographically). In K. Ohta and D. Pei, editors, Advances in Cryptology - ASIACRYPT '98, number 1514 in Lecture Notes in Computer Science, pages 380-391. Springer Verlag, Berlin Germany, 1998.
-
(1998)
Lecture Notes in Computer Science
, pp. 380-391
-
-
Burmester, M.1
Desmedt, Y.2
Seberry, J.3
-
4
-
-
85029542707
-
Foundations of Secure Interactive Computing
-
D. Beaver: Foundations of Secure Interactive Computing. CRYPTO 1991: 377-391.
-
CRYPTO 1991
, pp. 377-391
-
-
Beaver, D.1
-
5
-
-
84947778144
-
The Decision Diffie-Hellman problem
-
Third Algorithmic Number Theory Symposium, number 1423 Springer Verlag, Berlin Germany
-
Dan Boneh. The Decision Diffie-Hellman problem. In Third Algorithmic Number Theory Symposium, number 1423 in Lecture Notes in Computer Science, pages 48-63. Springer Verlag, Berlin Germany, 1998.
-
(1998)
Lecture Notes in Computer Science
, pp. 48-63
-
-
Boneh, D.1
-
6
-
-
0034500567
-
Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography
-
Portland, Oregon, July 2000. ACM.
-
Christian Cachin, Klaus Kursawe, and Victor Shoup. Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. In Proceedings of the 19th Annual ACM Symposium on Principles of Distributed Computing, Portland, Oregon, July 2000. ACM.
-
Proceedings of the 19th Annual ACM Symposium on Principles of Distributed Computing
-
-
Cachin, C.1
Kursawe, K.2
Shoup, V.3
-
8
-
-
84949745296
-
Digital payment systems with passive anonymity evoking trustees
-
E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, Proceedings of the Fourth European Symposium on Research in Computer Security (ESORICS), number 1146 Rome, Italy, September Springer Verlag, Berlin Germany
-
Jan Camenisch, Ueli Maurer, and Markus Stadler. Digital payment systems with passive anonymity evoking trustees. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, Proceedings of the Fourth European Symposium on Research in Computer Security (ESORICS), number 1146 in Lecture Notes in Computer Science, pages 33-43, Rome, Italy, September 1996. Springer Verlag, Berlin Germany.
-
(1996)
Lecture Notes in Computer Science
, pp. 33-43
-
-
Camenisch, J.1
Maurer, U.2
Stadler, M.3
-
9
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Hugo Krawczyk, editor, Advances in Cryptology-CRYPTO'98, number 1462 International Association for Cryptologic Research, Springer Verlag, Berlin Germany
-
Ronald Cramer and Victor Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Hugo Krawczyk, editor, Advances in Cryptology-CRYPTO'98, number 1462 in Lecture Notes in Computer Science, pages 13-25. International Association for Cryptologic Research, Springer Verlag, Berlin Germany, 1998.
-
(1998)
Lecture Notes in Computer Science
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
11
-
-
84956868340
-
Decision oracles are equivalent to matching oracles
-
International Workshop on Practice and Theory in Public Key Cryptography '99 (PKC '99), number 1560 Kamakura, Japan, March Springer Verlag, Berlin Germany
-
Helena Handschuh, Yiannis Tsiounis, and Moti Yung. Decision oracles are equivalent to matching oracles. In International Workshop on Practice and Theory in Public Key Cryptography '99 (PKC '99), number 1560 in Lecture Notes in Computer Science, Kamakura, Japan, March 1999. Springer Verlag, Berlin Germany.
-
(1999)
Lecture Notes in Computer Science
-
-
Handschuh, H.1
Tsiounis, Y.2
Yung, M.3
-
12
-
-
0002139049
-
The discrete logarithm problem
-
Carl Pomerance, editor, Cryptology and Computational Number Theory, Providence, American Mathematical Society
-
Kevin S. McCurley. The discrete logarithm problem. In Carl Pomerance, editor, Cryptology and Computational Number Theory, volume 42 of Proceedings of Symposia in Applied Mathematics, pages 49-74, Providence, 1990. American Mathematical Society.
-
(1990)
Proceedings of Symposia in Applied Mathematics
, vol.42
, pp. 49-74
-
-
McCurley, K.S.1
-
13
-
-
84955567079
-
Diffie-Hellman oracles
-
Neal Koblitz, editor. Advances in Cryptology-CRYPTO '96, number 1109 International Association for Cryptologic Research, Springer Verlag, Berlin Germany
-
Ueli M. Maurer and Stefan Wolf. Diffie-Hellman oracles. Neal Koblitz, editor. Advances in Cryptology-CRYPTO '96, number 1109 in Lecture Notes in Computer Science, pages 268-282. International Association for Cryptologic Research, Springer Verlag, Berlin Germany, 1996.
-
(1996)
Lecture Notes in Computer Science
, pp. 268-282
-
-
Maurer, U.M.1
Wolf, S.2
-
14
-
-
84957697337
-
Lower bounds on generic algorithms in groups
-
Kaisa Nyberg, editor, Advances in Cryptology-EUROCRYPT '98, number 1403 in International Association for Cryptologic Research, Springer Verlag, Berlin Germany
-
Ueli M. Maurer and Stefan Wolf. Lower bounds on generic algorithms in groups. In Kaisa Nyberg, editor, Advances in Cryptology-EUROCRYPT '98, number 1403 in Lecture Notes in Computer Science, pages 72-84. International Association for Cryptologic Research, Springer Verlag, Berlin Germany, 1998.
-
(1998)
Lecture Notes in Computer Science
, pp. 72-84
-
-
Maurer, U.M.1
Wolf, S.2
-
15
-
-
0346761925
-
Diffie-Hellman, Decision Diffie-Hellman, and discrete logarithms
-
Cambridge, USA, August
-
Ueli M. Maurer and Stefan Wolf. Diffie-Hellman, Decision Diffie-Hellman, and discrete logarithms. In IEEE Symposium on Information Theory, page 327, Cambridge, USA, August 1998.
-
(1998)
IEEE Symposium on Information Theory
, pp. 327
-
-
Maurer, U.M.1
Wolf, S.2
-
16
-
-
0031332843
-
Number theoretic constructions of efficient pseudo-random functions
-
IEEE Computer Society Press
-
Moni Naor and Omer Reingold. Number theoretic constructions of efficient pseudo-random functions. In 38th Symposium on Foundations of Computer Science (FOCS), pages 458-467. IEEE Computer Society Press, 1997.
-
(1997)
38th Symposium on Foundations of Computer Science (FOCS)
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
17
-
-
84937389342
-
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
-
Proceedings of the 2001 International Workshop on Practice and Theory in Public Key Cryptography (PKC'2001)(13-15 February 2001, Cheju Island, South Korea) K. Kim Ed., Springer-Verlag
-
Tatsuaki Okamoto and David Pointcheval, The Gap-Problems: a New Class of Problems for the Security of Cryptographic Schemes. Proceedings of the 2001 International Workshop on Practice and Theory in Public Key Cryptography (PKC'2001)(13-15 February 2001, Cheju Island, South Korea) K. Kim Ed., pages 104-118, LNCS 1992, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
18
-
-
84937405827
-
Anonymous fingerprinting with direct non-repudiation
-
T. Okamoto, editor. Advances in Cryptology - ASIACRYPT '2000, number 1976 Kyoto, Japan, International Association for Cryptologic Research, Springer Verlag, Berlin Germany
-
Birgit Pfitzmann and Ahmadeza Sadeghi. Anonymous fingerprinting with direct non-repudiation. T. Okamoto, editor. Advances in Cryptology - ASIACRYPT '2000, number 1976 in Lecture Notes in Computer Science, Kyoto, Japan, 2000, pages 401-414. International Association for Cryptologic Research, Springer Verlag, Berlin Germany.
-
(2000)
Lecture Notes in Computer Science
, pp. 401-414
-
-
Pfitzmann, B.1
Sadeghi, A.2
-
19
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
Walter Fumy, editor, Advances in Cryptology-EUROCRYPT'97, number 1233 International Association for Cryptologic Research, Springer Verlag, Berlin Germany
-
Victor Shoup. Lower bounds for discrete logarithms and related problems. In Walter Fumy, editor, Advances in Cryptology-EUROCRYPT'97, number 1233 in Lecture Notes in Computer Science, pages 256-266. International Association for Cryptologic Research, Springer Verlag, Berlin Germany, 1997.
-
(1997)
Lecture Notes in Computer Science
, pp. 256-266
-
-
Shoup, V.1
-
20
-
-
0037738807
-
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference; Eurocrypt 2001
-
Springer-Verlag, May
-
Ahmad-Reza Sadeghi, Michael Steiner: Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference; Eurocrypt 2001, LNCS 2045, Springer-Verlag, May 2001, 243-260.
-
(2001)
LNCS
, vol.2045
, pp. 243-260
-
-
Sadeghi, A.-R.1
Steiner, M.2
-
21
-
-
0034247455
-
Key agreement in dynamic peer groups
-
August
-
Michael Steiner, Gene Tsudik, and Michael Waidner. Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems, 11(8):769-780, August 2000.
-
(2000)
IEEE Transactions on Parallel and Distributed Systems
, vol.11
, Issue.8
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
|