-
1
-
-
84937409147
-
Remarks on mix-network based on permutation network
-
PKC 2001, Springer-Verlag
-
M. Abe and F. Hoshino, "Remarks on mix-network based on permutation network." PKC 2001, LNCS 1992, pp.317-324, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.1992
, pp. 317-324
-
-
Abe, M.1
Hoshino, F.2
-
3
-
-
84947906522
-
The exact security of digital signatures - How to sign with RSA and Rabin
-
Advances in Cryptology - EUROCRYPT'96, Springer-Verlag
-
M. Bellare and P. Rogaway, "The exact security of digital signatures - How to sign with RSA and Rabin," Advances in Cryptology - EUROCRYPT'96, LNCS 1070, pp.399-416, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84946840347
-
Short signatures from the Weil pairing
-
Advances in Cryptology - Asiacrypt 2001, Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," Advances in Cryptology - Asiacrypt 2001, LNCS 2248, pp.514-532, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
5
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
Advances in Cryptology-CRYPTO 2002, Springer-Verlag
-
E. Bresson, J. Stern, and M. Szydlo, "Threshold ring signatures and applications to ad-hoc groups," Advances in Cryptology-CRYPTO 2002, LNCS 2442, pp.465-480, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
6
-
-
84957354154
-
Efficient and generalized group signatures
-
Advances in Cryptology - EUROCRYPT'97, Springer-Verlag
-
J. Camenisch, "Efficient and generalized group signatures," Advances in Cryptology - EUROCRYPT'97, LNCS 1233, pp.465-479, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 465-479
-
-
Camenisch, J.1
-
7
-
-
84957610863
-
Proving in zero-knowledge that a number is the product of two safe primes
-
Advances in Cryptology - EUROCRYPT'99, Springer-Verlag
-
J. Camenisch and M. Michels, "Proving in zero-knowledge that a number is the product of two safe primes," Advances in Cryptology - EUROCRYPT'99, LNCS 1592, pp.107-122, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
8
-
-
84957661460
-
Easy come-easy go divisible cash
-
Advances in Cryptology -EUROCRYPT'98, Springer-Verlag
-
A. Chan, Y. Frankel, and Y. Tsiounis, ."Easy come-easy go divisible cash," Advances in Cryptology -EUROCRYPT'98, LNCS 1403, pp.561-575, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1403
, pp. 561-575
-
-
Chan, A.1
Frankel, Y.2
Tsiounis, Y.3
-
9
-
-
85024290278
-
Group signatures
-
Advances in Cryptology - EUROCRYPT'91, Springer-Verlag
-
D. Chaum and E. Van Heyst, "Group signatures," Advances in Cryptology - EUROCRYPT'91, LNCS 547, pp.257-265, Springer-Verlag, 1991.
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
10
-
-
84947215491
-
Optimal security proofs for PSS and other signature schemes
-
Advances in Cryptology - EUROCRYPT'02, Springer-Verlag
-
J.S. Coron, "Optimal security proofs for PSS and other signature schemes," Advances in Cryptology - EUROCRYPT'02, LNCS 2332, pp.272-287, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 272-287
-
-
Coron, J.S.1
-
12
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Advances in Cryptology - CRYPTO'94, Springer-Verlag
-
R. Cramer, I. Damgård, and B. Schoenmakers, "Proofs of partial knowledge and simplified design of witness hiding protocols," Advances in Cryptology - CRYPTO'94, LNCS 839, pp.174-187, Springer-Verlag, 1994.
-
(1994)
LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
13
-
-
77951106449
-
Multi-authority secret-ballot elections with linear work
-
Advances in Cryptology - EUROCRYPT'96, Springer-Verlag
-
R. Cramer, M. Franklin, B. Schoenmakers, and M. Yung, "Multi-authority secret-ballot elections with linear work," Advances in Cryptology - EUROCRYPT'96, LNCS 1070, pp.72-83, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 72-83
-
-
Cramer, R.1
Franklin, M.2
Schoenmakers, B.3
Yung, M.4
-
14
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
Advances in Cryptology - EUROCRYPT'97, Springer-Verlag
-
R. Cramer, R. Gennaro, and B. Schoenmakers, "A secure and optimally efficient multi-authority election scheme," Advances in Cryptology - EUROCRYPT'97, LNCS 1233, pp.103-118, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
15
-
-
0842327112
-
On the power of claw-free permutations
-
e-print, Aug.
-
Y. Dodis and L. Reyzin, "On the power of claw-free permutations," Technical Report, e-print, Aug. 2002.
-
(2002)
Technical Report
-
-
Dodis, Y.1
Reyzin, L.2
-
16
-
-
0024135240
-
Zero-knowledge proofs of identity
-
U. Feige, A. Fiat, and A. Shamir, "Zero-knowledge proofs of identity," J. Cryptology, vol.1, pp.77-94, 1988.
-
(1988)
J. Cryptology
, vol.1
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
18
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Advances in Cryptology - CRYPTO'86, Springer-Verlag
-
A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems," Advances in Cryptology - CRYPTO'86, LNCS 263, pp.186-199, Springer-Verlag, 1987.
-
(1987)
LNCS
, vol.263
, pp. 186-199
-
-
Fiat, A.1
Shamir, A.2
-
19
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," SIAM J. Comput., vol.17, no.2, pp.281-308, April 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
20
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
Advances in Cryptology - EUROCRYPT'88, Springer-Verlag
-
L.C. Guillou and J.-J. Quisquater, "A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory," Advances in Cryptology - EUROCRYPT'88, LNCS 330, pp.123-128, Springer-Verlag, 1988.
-
(1988)
LNCS
, vol.330
, pp. 123-128
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
21
-
-
84927752554
-
Designated verifier proofs and their applications
-
Advances in Cryptology - EUROCRYPT'96, Springer-Verlag
-
M. Jakobsson, K. Sako, and R. Impagliazzo, "Designated verifier proofs and their applications," Advances in Cryptology - EUROCRYPT'96, LNCS 1070, pp.143-154, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
22
-
-
79960836060
-
Deniable ring, authentication
-
Advances in Cryptology - CRYPTO 2002, Springer-Verlag
-
M. Naor, "Deniable ring, authentication," Advances in Cryptology - CRYPTO 2002, LNCS 2442, pp.481-498, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 481-498
-
-
Naor, M.1
-
23
-
-
84957705622
-
On concrete security treatment of signatures derived from identification
-
Advances in Cryptology - CRYPTO'98, Springer-Verlag
-
K. Ohta and T. Okamoto, "On concrete security treatment of signatures derived from identification," Advances in Cryptology - CRYPTO'98, LNCS 1462, pp.354-369, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 354-369
-
-
Ohta, K.1
Okamoto, T.2
-
24
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Advances in Cryptology -EUROCRYPT'99, Springer-Verlag
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," Advances in Cryptology -EUROCRYPT'99, LNCS 1592, pp.223-238, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
25
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures," J. Cryptology, vol.13, no.3, pp.339-360, 2000.
-
(2000)
J. Cryptology
, vol.13
, Issue.3
, pp. 339-360
-
-
Pointcheval, D.1
Stern, J.2
-
26
-
-
84946833891
-
How to leak a secret
-
Advances in Cryptology - Asiacrypt 2001, Springer-Verlag
-
R. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret," Advances in Cryptology - Asiacrypt 2001, LNCS 2248, pp.552-565, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.1
Shamir, A.2
Tauman, Y.3
-
27
-
-
84958950087
-
On monotone formula closure of SZK
-
A. De Santis, G. Di Crescenzo, G. Persiano, and M. Yung, "On monotone formula closure of SZK," Proc. 35th IEEE Annual Symposium on Foundations of Computer Science, pp.454-465, 1994.
-
(1994)
Proc. 35th IEEE Annual Symposium on Foundations of Computer Science
, pp. 454-465
-
-
De Santis, A.1
Di Crescenzo, G.2
Persiano, G.3
Yung, M.4
-
28
-
-
0000089246
-
Efficient signature generation for smart cards
-
C.P. Schnorr, "Efficient signature generation for smart cards, " J. Cryptology, vol.4, no.3, pp.239-252, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 239-252
-
-
Schnorr, C.P.1
|