-
1
-
-
84947770625
-
Dynamic-resharing verifiable secret sharing
-
Springer-Verlag
-
N. Alon, Z. Galil, M. Yung, “Dynamic-resharing verifiable secret sharing”, European Symposium on Algorithms 95 (ESA 95), Lecture Notes in Computer Science 979, pp.523-537, Springer-Verlag, 1995.
-
(1995)
European Symposium on Algorithms 95 (ESA 95), Lecture Notes in Computer Science
, vol.979
, pp. 523-537
-
-
Alon, N.1
Galil, Z.2
Yung, M.3
-
4
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
M. Ben-Or, S. Goldwasser, A. Wigderson, “Completeness theorems for noncryptographic fault-tolerant distributed computations”, Proceedings of the 20th ACM Symposium on Theory of Computing, pp.1-10, 1988.
-
(1988)
Proceedings of the 20Th ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
79958074367
-
A forward-secure digital signature scheme
-
Springer-Verlag
-
M. Bellare, S. Miner, “A forward-secure digital signature scheme”, Proceedings of Advances in Cryptology – Crypto 99, Lecture Notes in Computer Science 1666, pp.431-448, Springer-Verlag, 1999.
-
(1999)
Proceedings of Advances in Cryptology – Crypto 99, Lecture Notes in Computer Science
, vol.1666
, pp. 431-448
-
-
Bellare, M.1
Miner, S.2
-
7
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crepeau, I. Damgard, “Multiparty unconditionally secure protocols”, Proceedings of the 20th ACM Symposium on Theory of Computing, pp.11-19, 1988.
-
(1988)
Proceedings of the 20Th ACM Symposium on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
9
-
-
0024135240
-
Zero-knowledge proof of identity
-
U. Feige, A. Fiat, A. Shamir, “Zero-knowledge proof of identity”, Journal of Cryptology, Vol. 1, pp.77-94, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
10
-
-
0031375570
-
Optimal-resilience proactive public-key cryptosystems
-
IEEE
-
Y. Frankel, P. Gemmell, P. MacKenzie, M. Yung, “Optimal-resilience proactive public-key cryptosystems”, Proceedings of 38th Annual Symposium on Foundations of Computer Science, pp.384-393, IEEE, 1997.
-
(1997)
Proceedings of 38Th Annual Symposium on Foundations of Computer Science
, pp. 384-393
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
11
-
-
84958676203
-
Proactive RSA
-
Springer-Verlag
-
Y. Frankel, P. Gemmell, P. MacKenzie, M. Yung, “Proactive RSA”, Proceedings of Advances in Cryptology – Crypto 97, Lecture Notes in Computer Science 1294, pp.440-454, Springer-Verlag, 1997.
-
(1997)
Proceedings of Advances in Cryptology – Crypto 97, Lecture Notes in Computer Science
, vol.1294
, pp. 440-454
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
12
-
-
84956868458
-
Adaptively-secure optimal-resilience proactive RSA
-
Springer-Verlag
-
Y. Frankel, P. MacKenzie, M. Yung, “Adaptively-secure optimal-resilience proactive RSA”, Proceedings of Advances in Cryptology – Asiacrypt 99, Lecture Notes in Computer Science 1716, pp.180-194, Springer-Verlag, 1999.
-
(1999)
Proceedings of Advances in Cryptology – Asiacrypt 99, Lecture Notes in Computer Science
, vol.1716
, pp. 180-194
-
-
Frankel, Y.1
Mackenzie, P.2
Yung, M.3
-
13
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Springer-Verlag
-
A. Fiat, A. Shamir, “How to prove yourself: practical solutions to identification and signature problems”, Proceedings of Advances in Cryptology – Crypto 86, Lecture Notes in Computer Science 263, pp.186-194, Springer-Verlag, 1986.
-
(1986)
Proceedings of Advances in Cryptology – Crypto 86, Lecture Notes in Computer Science
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
14
-
-
84947926543
-
Robust threshold DSS dignatures
-
Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, “Robust threshold DSS dignatures”, Proceedings of Advances in Cryptology – Eurocrypt 96, Lecture Notes in Computer Science 1070, pp.354-371, Springer-Verlag, 1996.
-
(1996)
Proceedings of Advances in Cryptology – Eurocrypt 96, Lecture Notes in Computer Science
, vol.1070
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
15
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, “Robust and efficient sharing of RSA functions”, Proceedings of Advances in Cryptology – Crypto 96, Lecture Notes in Computer Science 1109, pp.157-172, Springer-Verlag, 1996.
-
(1996)
Proceedings of Advances in Cryptology – Crypto 96, Lecture Notes in Computer Science
, vol.1109
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
16
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
Springer-Verlag
-
L. Guillou, J. Quisquater, “A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory”, Proceedings of Advances in Cryptology – Eurocrypt 88, Lecture Notes in Computer Science 330, pp.123-128, Springer-Verlag, 1988.
-
(1988)
Proceedings of Advances in Cryptology – Eurocrypt 88, Lecture Notes in Computer Science
, vol.330
, pp. 123-128
-
-
Guillou, L.1
Quisquater, J.2
-
18
-
-
0030646698
-
Proactive public key and signature systems
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, M. Yung, “Proactive public key and signature systems”, Proceedings of the 4th ACM Symposium on Computer and Communication Security, 1997.
-
(1997)
Proceedings of the 4Th ACM Symposium on Computer and Communication Security
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
19
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
Springer-Verlag
-
A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, “Proactive secret sharing or: how to cope with perpetual leakage”, Proceedings of Advances in Cryptology – Crypto 95, Lecture Notes in Computer Science 963, pp.339-352, Springer-Verlag, 1995.
-
(1995)
Proceedings of Advances in Cryptology – Crypto 95, Lecture Notes in Computer Science
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
20
-
-
84921169347
-
A protocol to set up shared secret schemes without the assistance of a mutually trusted party
-
Springer-Verlag
-
I. Ingemarsson, G. Simmons, “A protocol to set up shared secret schemes without the assistance of a mutually trusted party”, Proceedings of Advances in Cryptology – Eurocrypt 90, Lecture Notes in Computer Science 473, pp.266-282, Springer-Verlag, 1990.
-
(1990)
Proceedings of Advances in Cryptology – Eurocrypt 90, Lecture Notes in Computer Science
, vol.473
, pp. 266-282
-
-
Ingemarsson, I.1
Simmons, G.2
-
21
-
-
33746441852
-
-
Technical Report MIT/LCS/TM-501, Massachusetts Institute of Technology, Cambridge, MA
-
S. Micali, “A secure and efficient digital signature algorithm,” Technical Report MIT/LCS/TM-501, Massachusetts Institute of Technology, Cambridge, MA, 1994.
-
(1994)
A Secure and Efficient Digital Signature Algorithm
-
-
Micali, S.1
-
22
-
-
33745972475
-
Fast signature generation with a Fiat-Shamir like scheme
-
Springer-Verlag
-
H. Ong, C. Schnorr, “Fast signature generation with a Fiat-Shamir like scheme”, Proceedings of Advances in Cryptology – Eurocrypt 90, Lecture Notes in Computer Science 473, pp.432-440, Springer-Verlag, 1990.
-
(1990)
Proceedings of Advances in Cryptology – Eurocrypt 90, Lecture Notes in Computer Science
, vol.473
, pp. 432-440
-
-
Ong, H.1
Schnorr, C.2
-
23
-
-
85031804925
-
A modification of the Fiat-Shamir scheme
-
Springer-Verlag
-
K. Ohta, T. Okamoto, “A modification of the Fiat-Shamir scheme”, Proceedings of Advances in Cryptology – Crypto 88, Lecture Notes in Computer Science 403, pp.232-243, Springer-Verlag, 1988.
-
(1988)
Proceedings of Advances in Cryptology – Crypto 88, Lecture Notes in Computer Science
, vol.403
, pp. 232-243
-
-
Ohta, K.1
Okamoto, T.2
-
25
-
-
84957689308
-
A simplified approach to threshold and proactive RSA
-
Springer-Verlag
-
T. Rabin, “A simplified approach to threshold and proactive RSA”, Proceedings of Advances in Cryptology – Crypto 98, Lecture Notes in Computer Science 1462, pp.89-104, Springer-Verlag, 1998.
-
(1998)
Proceedings of Advances in Cryptology – Crypto 98, Lecture Notes in Computer Science
, vol.1462
, pp. 89-104
-
-
Rabin, T.1
-
26
-
-
0018545449
-
How to share a secret
-
A. Shamir, “How to share a secret”, Communications of the ACM, 22(11), pp.612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|