-
2
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
LNCS Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. Advances in Cryptology - Crypto 1998, LNCS vol. 1462, Springer-Verlag, pp. 26-45, 1998
-
(1998)
Advances in Cryptology - Crypto 1998
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
3
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
LNCS Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. Advances in Cryptology - Eurocrypt 2000, LNCS vol. 1807, Springer-Verlag, pp. 139-155, 2000.
-
(2000)
Advances in Cryptology - Eurocrypt 2000
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
84945119254
-
Entity authentication and key distribution
-
LNCS Springer-Verlag
-
M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. Advances in Cryptology - Crypto 1993, LNCS vol. 773, Springer-Verlag, pp. 232-249, 1993.
-
(1993)
Advances in Cryptology - Crypto 1993
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
IEEE
-
S. M. Bellovin and M. Merritt. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. Proc. IEEE Security and Privacy, IEEE, pp. 72-84, 1992.
-
(1992)
Proc. IEEE Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
7
-
-
84937550984
-
Provably secure password authentication and key exchange using Diffie-Hellman
-
LNCS Springer-Verlag
-
V. Boyko, P. MacKenzie, and S. Patel. Provably Secure Password Authentication and Key Exchange Using Diffie-Hellman. Advances in Cryptology - Eurocrypt 2000, LNCS vol. 1807, Springer-Verlag, pp. 156-171, 2000.
-
(2000)
Advances in Cryptology - Eurocrypt 2000
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
9
-
-
84947232363
-
Universally composable notions of key exchange and secure channels
-
LNCS Springer-Verlag
-
R. Canetti and H. Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels. Advances in Cryptology - Eurocrypt 2002, LNCS vol. 2332, Springer-Verlag, pp. 337-351, 2002.
-
(2002)
Advances in Cryptology - Eurocrypt 2002
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
10
-
-
35248854495
-
On the limitations of universal composable two-party computation without set-up assumptions
-
Springer-Verlag (LNCS 2656)
-
R. Canetti, E. Kushilevitz and Y. Lindell. On the Limitations of Universal Composable Two-Party Computation Without Set-Up Assumptions. In EUROCRYPT 2003, Springer-Verlag (LNCS 2656), pages 68-86, 2003.
-
(2003)
EUROCRYPT 2003
, pp. 68-86
-
-
Canetti, R.1
Kushilevitz, E.2
Lindell, Y.3
-
11
-
-
35248819315
-
Universal composition with joint state
-
LNCS Springer-Verlag
-
R. Canetti and T. Rabin. Universal Composition with Joint State. Advances in Cryptology - Crypto 2003, LNCS vol. 2729, Springer-Verlag, pp. 265-281, 2003.
-
(2003)
Advances in Cryptology - Crypto 2003
, vol.2729
, pp. 265-281
-
-
Canetti, R.1
Rabin, T.2
-
12
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
LNCS Springer-Verlag
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. Advances in Cryptology - Crypto 1994, LNCS vol. 839, Springer-Verlag, pp. 174-187, 1994.
-
(1994)
Advances in Cryptology - Crypto 1994
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
13
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
LNCS Springer-Verlag
-
R. Cramer and V. Shoup. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. Advances in Cryptology - Eurocrypt 2002, LNCS vol. 2332, Springer-Verlag, pp. 45-64, 2002.
-
(2002)
Advances in Cryptology - Eurocrypt 2002
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
14
-
-
84880875026
-
Robust non-interactive zero-knowledge
-
LNCS Springer-Verlag
-
A. De Santis, G. Di Crescenzo, R. Ostrovsky, G. Persiano, and A. Sahai. Robust Non-Interactive Zero-Knowledge. Advances in Cryptology - Crypto 2001, LNCS vol. 2139, Springer-Verlag, pp. 566-598, 2001.
-
(2001)
Advances in Cryptology - Crypto 2001
, vol.2139
, pp. 566-598
-
-
De Santis, A.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
Sahai, A.5
-
16
-
-
0003157491
-
On-line/off-line digital signatures
-
S. Even, O. Goldreich, and S. Micali. On-Line/Off-Line Digital Signatures. J. Cryptology 9(1):35-67, 1996.
-
(1996)
J. Cryptology
, vol.9
, Issue.1
, pp. 35-67
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
17
-
-
35248886595
-
Strengthening zero-knowledge protocols using signatures
-
LNCS Springer-Verlag
-
J. Garay, P. MacKenzie, and K. Yang. Strengthening Zero-Knowledge Protocols Using Signatures. Advances in Cryptology - Eurocrypt 2003, LNCS vol. 2656, Springer-Verlag, pp. 177-194, 2003.
-
(2003)
Advances in Cryptology - Eurocrypt 2003
, vol.2656
, pp. 177-194
-
-
Garay, J.1
MacKenzie, P.2
Yang, K.3
-
18
-
-
35248830706
-
A framework for password-based authenticated key exchange
-
LNCS Springer-Verlag
-
R. Gennaro and Y. Lindell. A Framework for Password-Based Authenticated Key Exchange. Advances in Cryptology - Eurocrypt 2003, LNCS vol. 2656, Springer-Verlag, pp. 524-543, 2003.
-
(2003)
Advances in Cryptology - Eurocrypt 2003
, vol.2656
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
19
-
-
84880888233
-
Session-key generation using human passwords only
-
LNCS Springer-Verlag
-
O. Goldreich and Y. Lindell. Session-Key Generation using Human Passwords Only. Advances in Cryptology - Crypto 2001, LNCS vol. 2139, Springer-Verlag, pp. 408-432, 2001.
-
(2001)
Advances in Cryptology - Crypto 2001
, vol.2139
, pp. 408-432
-
-
Goldreich, O.1
Lindell, Y.2
-
21
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer. Protecting Poorly Chosen Secrets from Guessing Attacks. IEEE Journal on Selected Areas in Communications, 11(5): 648-656, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
24
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
LNCS Springer-Verlag
-
J. Katz, R. Ostrovsky, and M. Yung. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. Advances in Cryptology - Eurocrypt 2001, LNCS vol. 2045, Springer-Verlag, pp. 475-494, 2001.
-
(2001)
Advances in Cryptology - Eurocrypt 2001
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
25
-
-
35048882590
-
On simulation-sound trapdoor commitments
-
LNCS Springer-Verlag, Available from the ePrint archive, report 2003/252 from
-
P. MacKenzie and K. Yang. On Simulation-Sound Trapdoor Commitments. Advances in Cryptology - Eurocrypt 2004, LNCS vol. 3027, Springer-Verlag, pp. 382-400, 2004. Available from the ePrint archive, report 2003/252 from http://eprint.iacr.org.
-
(2004)
Advances in Cryptology - Eurocrypt 2004
, vol.3027
, pp. 382-400
-
-
MacKenzie, P.1
Yang, K.2
-
27
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
LNCS Springer-Verlag
-
C. Rackoff and D. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. Advances in Cryptology - Crypto 1991, LNCS vol. 576, Springer-Verlag, pp. 433-444, 1991.
-
(1991)
Advances in Cryptology - Crypto 1991
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
-
28
-
-
0033342534
-
Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
-
IEEE
-
A. Sahai. Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security. 40th IEEE Symposium on Foundations of Computer Science (FOCS), IEEE, pp. 543-553, 1999.
-
(1999)
40th IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 543-553
-
-
Sahai, A.1
|