-
2
-
-
0038687767
-
Efficient, dos-reeistant, secure key exchange for internet protocols
-
V. Atluri, editor. ACM Press
-
W. Aiello, S. Bellovin, M. Blaze, J. Ioannidis, O. Reingold, R. Canetti, and A. Keromytis. Efficient, dos-reeistant, secure key exchange for internet protocols. In V. Atluri, editor, Proc. of the 9th ACM Conference on Computer and Communications Security, pages 48-58. ACM Press, 2002.
-
(2002)
Proc. of the 9th ACM Conference on Computer and Communications Security
, pp. 48-58
-
-
Aiello, W.1
Bellovin, S.2
Blaze, M.3
Ioannidis, J.4
Reingold, O.5
Canetti, R.6
Keromytis, A.7
-
3
-
-
84954406641
-
Secret handshakes from pairing-based key agreements
-
Oakland, CA, May
-
D. Balfanz, G. Durfee, N. Shankar, D. Smetters, J. Staddon, and H. Wong. Secret handshakes from pairing-based key agreements. In 24th IEEE Symposium on Security and Privacy, Oakland, CA, May 2003.
-
(2003)
24th IEEE Symposium on Security and Privacy
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.4
Staddon, J.5
Wong, H.6
-
4
-
-
84946837370
-
Key-privacy in public-key encryption
-
C. Boyd, editor. Springer-Verlag. Lecture Notes in Computer Science No. 2248
-
M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval. Key-privacy in public-key encryption. In C. Boyd, editor, Advances in Cryptology-ASIACRYPT '2001, pages 566-582. Springer-Verlag, 2001. Lecture Notes in Computer Science No. 2248.
-
(2001)
Advances in Cryptology-ASIACRYPT '2001
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
5
-
-
84948986458
-
Optimal asymmetric encryption
-
A. D. Santis, editor. Springer, 1995. Lecture Notes in Computer Science No. 950
-
M. Bellare and P. Rogaway. Optimal asymmetric encryption. In A. D. Santis, editor, EUROCRYPT94, pages 92-111. Springer, 1995. Lecture Notes in Computer Science No. 950.
-
EUROCRYPT94
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
T. Beth, N. Cot, and I. Ingemarsson, editors. Springer-Verlag. Lecture Notes in Computer Science No. 209
-
R. Blom. An optimal class of symmetric key generation systems. In T. Beth, N. Cot, and I. Ingemarsson, editors, Proc. EUROCRYPT 84, pages 335-338. Springer-Verlag, 1985. Lecture Notes in Computer Science No. 209.
-
(1985)
Proc. EUROCRYPT 84
, pp. 335-338
-
-
Blom, R.1
-
7
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
E. P. Brickell, editor. Springer-Verlag. Lecture Notes in Computer Science No. 740
-
C. Blundo, A. DeSantis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In E. P. Brickell, editor, Proc. CRYPTO 92, pages 471-486. Springer-Verlag, 1992. Lecture Notes in Computer Science No. 740.
-
(1992)
Proc. CRYPTO 92
, pp. 471-486
-
-
Blundo, C.1
Desantis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
9
-
-
35048855095
-
Secret handshakes from ca-oblivious encryption
-
P. Lee, editor, Advances in Cryptology - ASIACRYPT 2004 Springer
-
C. Castelluccia, S. Jarecki, and G. Tsudik. Secret handshakes from ca-oblivious encryption. In P. Lee, editor, Advances in Cryptology - ASIACRYPT 2004, volume of Lecture Notes in Computer Science, pages Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
-
-
Castelluccia, C.1
Jarecki, S.2
Tsudik, G.3
-
10
-
-
0020915882
-
Blind signatures for untraceable payments
-
R. L. Rivest, A. Sherman, and D. Chaum, editors, New York, 1983. Plenum Press
-
D. Chaum. Blind signatures for untraceable payments. In R. L. Rivest, A. Sherman, and D. Chaum, editors, Proc. CRYPTO 88, pages 199-203, New York, 1983. Plenum Press.
-
Proc. CRYPTO 88
, pp. 199-203
-
-
Chaum, D.1
-
11
-
-
85024290278
-
Group signatures
-
D. W. Davies, editor, Berlin. Springer-Verlag. Lecture Notes in Computer Science No. 547
-
D. Chaum and E. V. Heyst. Group signatures. In D. W. Davies, editor, Advances in Cryptology - Eurocrypt '91, pages 257-265, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science No. 547.
-
(1991)
Advances in Cryptology - Eurocrypt '91
, pp. 257-265
-
-
Chaum, D.1
Heyst, E.V.2
-
12
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Y. G. Desmedt, editor. Springer. Lecture Notes in Computer Science No. 839
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Y. G. Desmedt, editor, Proc. CRYPTO 94, pages 174-187. Springer, 1994. Lecture Notes in Computer Science No. 839.
-
(1994)
Proc. CRYPTO 94
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
13
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
H. Krawczyk, editor. Springer-Verlag. Lecture Notes in Computer Science No. 1462
-
R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk, editor, Proc. CRYPTO 98, pages 13-25. Springer-Verlag, 1998. Lecture Notes in Computer Science No. 1462.
-
(1998)
Proc. CRYPTO 98
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
16
-
-
84880853825
-
Rsa-oaep is secure under the rsa assumption
-
J. Kilian, editor, Proc. CRYPTO 2001. Springer-Verlag
-
E. Fujisaki, T. Okamoto, D. Pointcheval, and J. Stern. Rsa-oaep is secure under the rsa assumption. In J. Kilian, editor, Proc. CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 260-274. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 260-274
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
17
-
-
0022793132
-
How to construct random functions
-
Oct.
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, 33(4):792-807, Oct. 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
18
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Apr.
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, 17(2):281-308, Apr. 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
20
-
-
1642394295
-
Hidden credentials
-
J. Holt, R. Bradshaw, K. Seamons, and H. Orman. Hidden credentials. In Proceedings of 2nd ACM Workshop on Privacy in the Electronic Society, pages 147-173, 2003.
-
(2003)
Proceedings of 2nd ACM Workshop on Privacy in the Electronic Society
, pp. 147-173
-
-
Holt, J.1
Bradshaw, R.2
Seamons, K.3
Orman, H.4
-
22
-
-
35248816546
-
Sigma: The 'sign-and-mac' approach to authenticated diffie-hellman and its use in the ike-protocols
-
D. Boneh, editor, Proc. CRYPTO 2003. Springer-Verlag
-
H. Krawczyk. Sigma: The 'sign-and-mac' approach to authenticated diffie-hellman and its use in the ike-protocols. In D. Boneh, editor, Proc. CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 400-425. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2729
, pp. 400-425
-
-
Krawczyk, H.1
-
24
-
-
79960836060
-
Deniable ring authentication
-
M. Yung, editor, Proc. CRYPTO 2002. Springer-Verlag
-
M. Naor. Deniable ring authentication. In M. Yung, editor, Proc. CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 481-498. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 481-498
-
-
Naor, M.1
-
25
-
-
0034449509
-
User privacy issues regarding certificates and the tls protocol: The design and implementation of the spsl protocol
-
ACM
-
P. Persiano and I. Visconti. User privacy issues regarding certificates and the tls protocol: the design and implementation of the spsl protocol. In ACM Conference on Computer and Communications Security, pages 53-62. ACM, 2000.
-
(2000)
ACM Conference on Computer and Communications Security
, pp. 53-62
-
-
Persiano, P.1
Visconti, I.2
-
26
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
J. Feigenbaum, editor. Springer. Lecture Notes in Computer Science No. 576
-
C. Rackoff and D. R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In J. Feigenbaum, editor, Proc. CRYPTO 91, pages 433-444. Springer, 1992. Lecture Notes in Computer Science No. 576.
-
(1992)
Proc. CRYPTO 91
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
30
-
-
14844282596
-
K-anonymous message transmission
-
V. Atluri, editor, Washington D.C., USA, October. ACM, ACM Press
-
L. von Ahn, A. Bortz, and N. Hopper, k-anonymous message transmission. In V. Atluri, editor, Proc. of ACM-CCS 03, pages 122-130, Washington D.C., USA, October 2003. ACM, ACM Press.
-
(2003)
Proc. of ACM-CCS 03
, pp. 122-130
-
-
Von Ahn, L.1
Bortz, A.2
Hopper, N.3
|