-
1
-
-
77955907421
-
A public-key cryptosystem with worst-case/Average-case equivalence
-
Dec.
-
M. Ajtai and C. Dwork. A Public-Key Cryptosystem with Worst-Case/Average-Case Equivalence. ECCC, TR96-065, Dec. 1996.
-
(1996)
ECCC, TR96-065
-
-
Ajtai, M.1
Dwork, C.2
-
2
-
-
84957616594
-
Optimistic fair exchange of digital signatures
-
N. Asokan, V. Shoup, M. Waidner. Optimistic Fair Exchange of Digital Signatures (Extended Abstract). EUROCRYPT 1998: 591-606
-
(1998)
EUROCRYPT
, pp. 591-606
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
3
-
-
0006578697
-
Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation
-
M. Bellare and M. Yung, Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation J. Cryptology 9(3): 149-166 (1996)
-
(1996)
J. Cryptology
, vol.9
, Issue.3
, pp. 149-166
-
-
Bellare, M.1
Yung, M.2
-
4
-
-
84937441148
-
Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
-
J. Camenisch and I. Damgard Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. ASI-ACRYPT 2000: 331-345
-
(2000)
ASI-ACRYPT
, pp. 331-345
-
-
Camenisch, J.1
Damgard, I.2
-
5
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
J. Camenisch and V. Shoup. Practical Verifiable Encryption and Decryption of Discrete Logarithms. CRYPTO 2003: 126-144
-
(2003)
CRYPTO
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
7
-
-
0346180997
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public key encryption
-
R. Cramer, V. Shoup. Universal Hash Proofs and a paradigm for adaptive chosen ciphertext secure public key encryption. Eurocrypt 2002.
-
(2002)
Eurocrypt
-
-
Cramer, R.1
Shoup, V.2
-
10
-
-
33645603848
-
A public key cryptosystem and a signature scheme based on discrete logarithm
-
T. ElGamal. A Public Key Cryptosystem and a signature scheme based on discrete logarithm. Proceedings of Crypto 84.
-
Proceedings of Crypto
, vol.84
-
-
ElGamal, T.1
-
11
-
-
0342733642
-
Multiple noninteractive zero knowledge proofs under general assumptions
-
U. Feige, D. Lapidot, A. Shamir: Multiple Noninteractive Zero Knowledge Proofs Under General Assumptions. SIAM J. Comput. 29(1): 1-28 (1999)
-
(1999)
SIAM J. Comput.
, vol.29
, Issue.1
, pp. 1-28
-
-
Feige, U.1
Lapidot, D.2
Shamir, A.3
-
13
-
-
85034643663
-
Symmetric public-key encryption
-
Zvi Galil, Stuart Haber, Moti Yung. Symmetric Public-Key Encryption. CRYPTO 1985: 128-137
-
(1985)
CRYPTO
, pp. 128-137
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
14
-
-
0034205405
-
On the limits of nonapproximability of lattice problems
-
O. Goldreich, S. Goldwasser. On the Limits of Nonapproximability of Lattice Problems. JCSS 60(3): 540-563 (2000)
-
(2000)
JCSS
, vol.60
, Issue.3
, pp. 540-563
-
-
Goldreich, O.1
Goldwasser, S.2
-
17
-
-
33645599872
-
Proofs that yield nothing but their validity or NP in zero knowledge
-
O. Goldreich, S. Micali, and A. Wigderon. Proofs that Yield Nothing but their Validity or NP in Zero Knowledge. JACM 91.
-
JACM 91
-
-
Goldreich, O.1
Micali, S.2
Wigderon, A.3
-
20
-
-
33645605199
-
Efficient and non-malleable proofs of plaintext knowledge and applications
-
Jonathan Katz. Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications. Eurocrypt 2003.
-
(2003)
Eurocrypt
-
-
Katz, J.1
-
21
-
-
2942753683
-
Statistical zero-knowledge proofs with efficient provers: Lattice problems and more
-
Santa Barbara, CA, USA, August LNCS 2729, Springer
-
D. Micciancio and S. Vadhan. Statistical zero-knowledge proofs with efficient provers: lattice problems and more. Advances in Cryptology - Crypto 2003. Santa Barbara, CA, USA, August 2003. LNCS 2729, Springer.
-
(2003)
Advances in Cryptology - Crypto 2003
-
-
Micciancio, D.1
Vadhan, S.2
-
22
-
-
0024983231
-
Public-Key cryptosystems provably secure against chosen ciphertext attacks
-
May 13-17, Baltimore, Maryland, United States
-
M. Naor, M. Yung, Public-key cryptosystems provably secure against chosen ciphertext attacks, Proceedings of the twenty-second annual ACM symposium on Theory of computing, p.427-437, May 13-17, 1990, Baltimore, Maryland, United States
-
(1990)
Proceedings of the Twenty-second Annual ACM Symposium on Theory of Computing
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
23
-
-
84957660976
-
Cryptanalysis of the Ajtai-Dwork cryptosystem
-
Advances in Cryptology: Proceedings of Crypto '98, Springer-Verlag
-
P. Nguyen and J. Stern. Cryptanalysis of the Ajtai-Dwork cryptosystem. In Advances in Cryptology: Proceedings of Crypto '98, volume 1462 of Lecture Notes in Computer Science, pages 223-242. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 223-242
-
-
Nguyen, P.1
Stern, J.2
-
25
-
-
0017930809
-
Public key cryptography
-
R. L. Rivest, A. Shamir, L. Adleman Public key cryptography, CACM 21, 120-126, 1978.
-
(1978)
CACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
26
-
-
84947917119
-
Publicly verifiable secret sharing
-
M. Stadler. Publicly Verifiable Secret Sharing. EUROCRYPT 1996: 190-199
-
(1996)
EUROCRYPT
, pp. 190-199
-
-
Stadler, M.1
|