-
2
-
-
84937431456
-
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
-
Springer Verlag
-
Algesheimer, J., Camenisch, J., Shoup, V.: Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In: Proceedings of CRYPTO 2002, Springer Verlag (2002) 417-432
-
(2002)
Proceedings of CRYPTO 2002
, pp. 417-432
-
-
Algesheimer, J.1
Camenisch, J.2
Shoup, V.3
-
3
-
-
84946830669
-
Fully distributed threshold RSA under standard assumptions
-
Fouque, P.A., Stern, J.: Fully distributed threshold RSA under standard assumptions. In: Proceedings of Asiacrypt. (2001) 310-330
-
(2001)
Proceedings of Asiacrypt.
, pp. 310-330
-
-
Fouque, P.A.1
Stern, J.2
-
4
-
-
84869776039
-
Practical threshold RSA signatures without a trusted dealer
-
Basic Research in Computer Science, University of Aarhus
-
Damgård, I.B., Koprowski, M.: Practical Threshold RSA Signatures Without a Trusted Dealer. Technical Report RS-00-30, Basic Research in Computer Science, University of Aarhus (2000)
-
(2000)
Technical Report
, vol.RS-00-30
-
-
Damgård, I.B.1
Koprowski, M.2
-
7
-
-
84948954120
-
Computing inverses over a secret shared modulus
-
EUROCRYPT 2000. Springer-Verlag
-
Catalano, D., Gennaro, R., Halevi, S.: Computing inverses over a secret shared modulus. In: EUROCRYPT 2000. Volume 1807 of LNCS., Springer-Verlag (2000) 190-207
-
(2000)
LNCS
, vol.1807
, pp. 190-207
-
-
Catalano, D.1
Gennaro, R.2
Halevi, S.3
-
8
-
-
4243114091
-
Efficient generation of shared RSA keys
-
Boneh, D., Franklin, M.: Efficient generation of shared RSA keys. Journal of the ACM (JACM) 48 (2001) 702-722
-
(2001)
Journal of the ACM (JACM)
, vol.48
, pp. 702-722
-
-
Boneh, D.1
Franklin, M.2
-
10
-
-
84947284060
-
Secure multi-party computation without agreement
-
16th International Symposium on Distributed Computing
-
Goldwasser, S., Lindell, Y.: Secure Multi-Party Computation Without Agreement. In: 16th International Symposium on Distributed Computing. Volume 2508 of LNCS. (2002) 17-32
-
(2002)
LNCS
, vol.2508
, pp. 17-32
-
-
Goldwasser, S.1
Lindell, Y.2
-
12
-
-
84958774556
-
A statistically-hiding integer commitment scheme based on groups with hidden order
-
Damgård, J., Fujisaki, E.: A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. In: ASIACRYPT. (2002) 125-142
-
(2002)
ASIACRYPT
, pp. 125-142
-
-
Damgård, J.1
Fujisaki, E.2
-
13
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
CRYPTO 1991
-
Pedersen, T.: Non-interactive and information-theoretic secure verifiable secret sharing. In: CRYPTO 1991. Volume 576 of LNCS. (1991) 129-140
-
(1991)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.1
-
15
-
-
84958986003
-
Guaranteed correct sharing of integer factorization with off-line shareholders
-
Public Key Cryptography
-
Mao, W.: Guaranteed Correct Sharing of Integer Factorization with Off-line Shareholders. In: Public Key Cryptography. Volume 1431 of LNCS. (1998) 60-71
-
(1998)
LNCS
, vol.1431
, pp. 60-71
-
-
Mao, W.1
-
16
-
-
84966243285
-
Modular multiplication without trial division
-
Montgomery, P.L.: Modular Multiplication Without Trial Division. Mathematics of Computation 44 (1985) 519-521
-
(1985)
Mathematics of Computation
, vol.44
, pp. 519-521
-
-
Montgomery, P.L.1
-
20
-
-
0037190355
-
Adaptively secure distributed public-key systems
-
Frankel, Y., MacKenzie, P., Yung, M.: Adaptively secure distributed public-key systems. Theoretical Computer Science 287 (2002) 535-561
-
(2002)
Theoretical Computer Science
, vol.287
, pp. 535-561
-
-
Frankel, Y.1
MacKenzie, P.2
Yung, M.3
|