-
1
-
-
84947283407
-
From identification to signatures via the Fiat-Shamir transform: Minimizing assumptions for security and forward-security
-
Springer-Verlag
-
M. Abdalla, J. An, M. Bellare and C. Namprempre. From identification to signatures via the Fiat-Shamir transform: minimizing assumptions for security and forward-security. Advances in Cryptography-EUROCRYPT 02, Lecture Notes in Computer Science, Springer-Verlag, 2002.
-
(2002)
Advances in Cryptography-EUROCRYPT 02, Lecture Notes in Computer Science
-
-
Abdalla, M.1
An, J.2
Bellare, M.3
Namprempre, C.4
-
2
-
-
0002716562
-
How to go beyond the black-box simulation barrier
-
B. Barak. How to go beyond the black-box simulation barrier. In Proc. of the 42nd FOCS, 2001.
-
Proc. of the 42nd FOCS, 2001
-
-
Barak, B.1
-
3
-
-
0010402853
-
Identity-based encryption from Weil pairing
-
Preliminary version in Crypto
-
D. Boneh and M. Franklin. Identity-based encryption from Weil pairing. Preliminary version in Crypto, 2001.
-
(2001)
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
0011188089
-
On the (im)possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Crypto 2001.
-
(2001)
Crypto
-
-
Barak, B.1
Goldreich, O.2
Rudich, R.3
Sahai, A.4
Vadhan, S.5
Yang, K.6
-
6
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. Blum, S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM J. Comput. 13(4): 850-864 1984.
-
(1984)
SIAM J. Comput.
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
8
-
-
0031619016
-
The random oracle methodology, revisited
-
Dallas, 23-26 May
-
Ran Canetti, Oded Goldreich, and Shai Halevi. The random oracle methodology, revisited. In Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, pages 209-218, Dallas, 23-26 May, 1998.
-
(1998)
Proceedings of the 32nd Annual ACM Symposium on Theory of Computing
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
11
-
-
0033332890
-
Magic functions
-
In IEEE, editor; IEEE Computer Society Press
-
C. Dwork, M. Naor, O. Reingold and L. Stockmeyer. Magic functions. In IEEE, editor, 40th Annual Symposium of Foundations of Computer Science: October 17-19, 1999, New York City, New York, pages 523-534, IEEE Computer Society Press, 1999.
-
(1999)
40th Annual Symposium of Foundations of Computer Science: October 17-19, 1999, New York City, New York
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Stockmeyer, L.4
-
12
-
-
0024135240
-
Zero knowledge proofs of identity
-
U. Feige, A.Fiat, and A. Shamir. Zero knowledge proofs of identity. Journal of Cryptology, 1(2), pp. 77-94, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
13
-
-
84990731886
-
How to prove to yourself: Practical solutions to identification and signature problems
-
Springer, Berlin
-
Amos Fiat and Adi Shamir. How to prove to yourself: practical solutions to identification and signature problems. In Advances in Cryptology-Crypto 86, pages 186-194, Springer, Berlin 1987.
-
(1987)
Advances in Cryptology-Crypto 86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
15
-
-
84957661041
-
Secure hash-and-sign signatures without the random oracle
-
J. Stern ed., Springer-Verlag
-
R. Gennaro, S. Halevi and T. Rabin. Secure hash-and-sign signatures without the random oracle. Advances in Cryptology - EUROCRYPT 99, Lecture Notes in Computer Science Vol. 1592, J. Stern ed., Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT 99, Lecture Notes in Computer Science
, vol.1592
-
-
Gennaro, R.1
Halevi, S.2
Rabin, T.3
-
17
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17(2): 281-308, April 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
19
-
-
0026963441
-
A note on efficient zero-knowledge proofs and arguments
-
J. Kilian. A note on efficient zero-knowledge proofs and arguments. In 24'th STOC, pages 723-732, 1992.
-
(1992)
24'th STOC
, pp. 723-732
-
-
Kilian, J.1
-
20
-
-
84969346266
-
A certified digital signature
-
July; Santa-Barbara, California
-
R.C. Merkle. A certified digital signature. Proceedings on Advances in Cryptology, pages 218-238, July 1989, Santa-Barbara, California.
-
(1989)
Proceedings on Advances in Cryptology
, pp. 218-238
-
-
Merkle, R.C.1
-
21
-
-
0001859260
-
Provably secure and practical identification schemes and corresponding signature schemes
-
E. Brickell ed., Springer-Verlag
-
T. Okamoto. Provably secure and practical identification schemes and corresponding signature schemes. Advances in Cryptology - CRYPTO 92, Lecture Notes in Computer Science Vol. 740, E. Brickell ed., Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology - CRYPTO 92, Lecture Notes in Computer Science
, vol.740
-
-
Okamoto, T.1
-
22
-
-
0003602325
-
The MD5 message-digest algorithm
-
RFC 1321, April
-
R. Rivest. The MD5 message-digest algorithm. RFC 1321, April 1992.
-
(1992)
-
-
Rivest, R.1
-
23
-
-
0034854953
-
Computationally sound proofs
-
Preliminary version in 35th FOCS, 1994
-
Silvio Micali. Computationally sound proofs. SICOMP, vol. 30(4), pages 1253-1298, 2000. Preliminary version in 35th FOCS, 1994.
-
(2000)
SICOMP
, vol.30
, Issue.4
, pp. 1253-1298
-
-
Micali, S.1
-
24
-
-
0344839013
-
Improving the exact security of digital signature schemes
-
S. Micali and L. Reyzin. Improving the exact security of digital signature schemes. Journal of Cryptology, 15(1):1-18, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.1
, pp. 1-18
-
-
Micali, S.1
Reyzin, L.2
-
25
-
-
0001448484
-
Bit commitment using pseudorandom generators
-
M. Naor. Bit commitment using pseudorandom generators. Journal of Cryptology, Vol.4, pages 151-158, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 151-158
-
-
Naor, M.1
-
26
-
-
84974533327
-
Universal one-way hash functions and their cryptographic applications
-
M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. STOC 89.
-
STOC 89
-
-
Naor, M.1
Yung, M.2
-
28
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
John Rompel. One-Way Functions are Necessary and Sufficient for Secure Signatures. STOC 1990 387-394.
-
STOC 1990
, pp. 387-394
-
-
Rompel, J.1
-
29
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr. Efficient signature generation by smart cards. Journal of Cryptology 4(3):161-174.
-
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr1
|