-
1
-
-
0033750375
-
Optimistic fair exchange of digital signatures
-
[ASW]
-
[ASW] N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications, 18(4):593-610, 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 593-610
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
4
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
[BDPR]
-
[BDPR] M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In Advances in Cryptology - Crypto '98, pages 26-45, 1998.
-
(1998)
Advances in Cryptology - Crypto '98
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
5
-
-
78650941074
-
Simplified OAEP for the RSA and Rabin functions
-
[Bo]
-
[Bo] D. Boneh. Simplified OAEP for the RSA and Rabin functions. In Advances in Cryptology - Crypto 2001, pages 275-291, 2001.
-
(2001)
Advances in Cryptology - Crypto 2001
, pp. 275-291
-
-
Boneh, D.1
-
8
-
-
0031619016
-
The random oracle methodology, revisited
-
[CGH]
-
[CGH] R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing, pages 209-218, 1998.
-
(1998)
Proceedings of the 30th Annual ACM Symposium on Theory of Computing
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
9
-
-
84947924912
-
Finding a small root of a univariate modular equation
-
[Co]
-
[Co] D. Coppersmith. Finding a small root of a univariate modular equation. In Advances in Cryptology-Eurocrypt '96, pages 155-165, 1996.
-
(1996)
Advances in Cryptology-Eurocrypt '96
, pp. 155-165
-
-
Coppersmith, D.1
-
11
-
-
0343337504
-
Non-malleable cryptography
-
[DDN2]
-
[DDN2] D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. SIAM Journal on Computing, 30(2):391-437, 2000.
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
12
-
-
84880853825
-
RSA-OAEP is secure under the RSA assumption
-
[FOPS]. An earlier version appeared as Cryptology ePrint Archive, Report 2000/061
-
[FOPS] E. Fujisaki, T. Okamoto, D. Pointcheval, and J. Stem. RSA-OAEP is secure under the RSA assumption. In Advances in Cryptology - Crypto 2001, pages 260-274, 2001. An earlier version appeared as Cryptology ePrint Archive, Report 2000/061, http://eprint.iacr.org.
-
(2001)
Advances in Cryptology - Crypto 2001
, pp. 260-274
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stem, J.4
-
14
-
-
0004192381
-
-
[MvOV]. CRC Press, Boca Raton, FL
-
[MvOV] A. Menesez, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menesez, A.1
Van Oorschot, P.2
Vanstone, S.3
-
16
-
-
84974554584
-
Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack
-
[RS]
-
[RS] C. Rackoff and D. Simon. Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology - Crypto '91, pages 433-444, 1991.
-
(1991)
Advances in Cryptology - Crypto '91
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
-
17
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
[RSA]
-
[RSA] R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2): 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
18
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
[Sh 1 ]
-
[Sh 1 ] V. Shoup. Lower bounds for discrete logarithms and related problems. In Advances in Cryptology-Eurocrypt '97, pages 256-266, 1997.
-
(1997)
Advances in Cryptology-Eurocrypt '97
, pp. 256-266
-
-
Shoup, V.1
-
19
-
-
0004023090
-
On formal models for secure key exchange
-
[Sh2]
-
[Sh2] V. Shoup. On formal models for secure key exchange. Cryptology ePrint Archive, Report 1999/012, 1999. http://eprint.iacr.org.
-
(1999)
Cryptology EPrint Archive, Report
, vol.1999
, Issue.12
-
-
Shoup, V.1
|