-
1
-
-
0033280441
-
The proactive security toolkit and applications
-
Nov.
-
B. Barak, A. Herzberg, D. Naor, and E. Shai. The proactive security toolkit and applications. In Proc. 6th ACM Conf. Computer and Communications Security, pp. 18-27, Nov. 1999.
-
(1999)
Proc. 6th ACM Conf. Computer and Communications Security
, pp. 18-27
-
-
Barak, B.1
Herzberg, A.2
Naor, D.3
Shai, E.4
-
2
-
-
0141911095
-
Non-interactive oblivious transfer and applications
-
M. Bellare, S. Micali. Non-interactive oblivious transfer and applications. In Proc. CRYPTO '89, 1989.
-
(1989)
Proc. CRYPTO '89
-
-
Bellare, M.1
Micali, S.2
-
6
-
-
0026383119
-
Noninteractive zero-knowledge
-
M. Blum, A. DeSantis, S. Micali, and G. Persiano. Noninteractive zero-knowledge. SIAM Journal of Computing 20(6): 1084-1118, 1991.
-
(1991)
SIAM Journal of Computing
, vol.20
, Issue.6
, pp. 1084-1118
-
-
Blum, M.1
DeSantis, A.2
Micali, S.3
Persiano, G.4
-
7
-
-
0005098316
-
Relations among notions of security for public-key encryption systems
-
LNCS 1462
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption systems. In Proc. CRYPTO '98 (LNCS 1462), 1998.
-
(1998)
Proc. CRYPTO '98
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
9
-
-
0002181960
-
Digital multisignatures
-
H. J. Beker and F. C. Piper, editors. Clarendon Press
-
C. Boyd. Digital multisignatures. In H. J. Beker and F. C. Piper, editors, Cryptography and Coding, pp. 241-246. Clarendon Press, 1986.
-
(1986)
Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
10
-
-
0002766455
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In CRYPTO '98, 1998.
-
(1998)
CRYPTO '98
-
-
Cramer, R.1
Shoup, V.2
-
12
-
-
84880875026
-
Robust non-interactive zero knowledge
-
LNCS 2139
-
A. De Santis, G. Di Crescenzo, R. Ostrovsky, G. Persiano, and A. Sahai. Robust non-interactive zero knowledge. In Proc. CRYPTO 2001 (LNCS 2139), pp. 566-598, 2001.
-
(2001)
Proc. CRYPTO 2001
, pp. 566-598
-
-
De Santis, A.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
Sahai, A.5
-
13
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
LNCS 293
-
Y. Desmedt. Society and group oriented cryptography: a new concept. In Proc. CRYPTO '87 (LNCS 293), pp. 120-127, 1987.
-
(1987)
Proc. CRYPTO '87
, pp. 120-127
-
-
Desmedt, Y.1
-
14
-
-
85023809951
-
Threshold cryptosystems
-
LNCS 435
-
Y. Desmedt and Y. Frankel. Threshold cryptosystems. In Proc. CRYPTO '89 (LNCS 435), pp. 307-315, 1989.
-
(1989)
Proc. CRYPTO '89
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
17
-
-
84947926543
-
Robust threshold DSS signatures
-
LNCS 1070
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In Proc. EUROCRYPT '96 (LNCS 1070), pp. 354-371, 1996.
-
(1996)
Proc. EUROCRYPT '96
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
19
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Apr.
-
S. Goldwasser, S. Micali and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing 17(2):281-308, Apr. 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
21
-
-
34548147051
-
Networked cryptographic devices resilient to capture
-
May 2001.
-
P. MacKenzie and M. K. Reiter. Networked cryptographic devices resilient to capture. DIMACS Technical Report 2001-19, May 2001.
-
DIMACS Technical Report
, vol.2001
, Issue.19
-
-
MacKenzie, P.1
Reiter, M.K.2
-
23
-
-
0003727808
-
Two-party generation of DSA Signatures
-
(LNCS 2139), Aug.
-
P. MacKenzie and M. K. Reiter. Two-party generation of DSA Signatures. In Proc. CRYPTO 2001 (LNCS 2139), Aug. 2001.
-
(2001)
Proc. CRYPTO 2001
-
-
MacKenzie, P.1
Reiter, M.K.2
-
25
-
-
84957366256
-
A new public-key cryptosystem
-
LNCS 1233
-
D. Naccache and J. Stern. A new public-key cryptosystem. In Proc. EUROCRYPT '97 (LNCS 1233), pp. 27-36, 1997.
-
(1997)
Proc. EUROCRYPT '97
, pp. 27-36
-
-
Naccache, D.1
Stern, J.2
-
28
-
-
0003659340
-
Efficient oblivious transfer protocols
-
Jan.
-
M. Naor, B. Pinkas. Efficient oblivious transfer protocols. In Proc. SODA 2001, Jan. 2001.
-
(2001)
Proc. SODA 2001
-
-
Naor, M.1
Pinkas, B.2
-
29
-
-
84956852274
-
A new public-key cryptosystem, as secure as factoring
-
LNCS 1403
-
T. Okamoto and S. Uchiyama. A new public-key cryptosystem, as secure as factoring. In Proc. EUROCRYPT '98 (LNCS 1403), pp. 308-318, 1998.
-
(1998)
Proc. EUROCRYPT '98
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
30
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
LNCS 1592
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proc. EUROCRYPT '99 (LNCS 1592), pp. 223-238, 1999.
-
(1999)
Proc. EUROCRYPT '99
, pp. 223-238
-
-
Paillier, P.1
-
31
-
-
0030376048
-
The Q key management service
-
M. Reiter, M. Franklin, J. Lacy, R. Wright. The Q key management service. Journal of Computer Security 4(4):267-297, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.4
, pp. 267-297
-
-
Reiter, M.1
Franklin, M.2
Lacy, J.3
Wright, R.4
-
32
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb.
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2):120-126, Feb. 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
|