-
1
-
-
84947931331
-
Some recent research aspects of threshold cryptography
-
Okamoto E., Davida G. and Mambo M. (ed.), Lecture Notes in Computer Science 1396, Berlin: Springer-Verlag
-
Desmedt Y.. Some recent research aspects of threshold cryptography. In: Okamoto E., Davida G., Mambo M. eds.. Information Security. Lecture Notes in Computer Science 1396. Berlin: Springer-Verlag. 1997, 158-173
-
(1997)
Information Security
, pp. 158-173
-
-
Desmedt, Y.1
-
2
-
-
84957083549
-
Adaptive security for threshold cryptosystems
-
Wiener M. (ed.), Berlin: Springer-Verlag
-
Canetti R., Gennaro R., Jarecki S., Krawczyk H., Rabin T.. Adaptive security for threshold cryptosystems. In: Wiener M. ed.. Proceedings of Advances in Cryptology-CRYPTO '99. Berlin: Springer-Verlag, 1999, 98-115
-
(1999)
Proceedings of Advances in Cryptology-CRYPTO '99
, pp. 98-115
-
-
Canetti, R.1
Gennaro, R.2
Jarecki, S.3
Krawczyk, H.4
Rabin, T.5
-
3
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R., Schroeder M.. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978, 21(12): 993-999
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
4
-
-
0001940580
-
Provably secure session key distribution-The three party case
-
Las Vegas, Nevada, USA
-
Bellare M., Rogaway P.. Provably secure session key distribution-The three party case. In: Proceedings of the 27th Annual ACM Symposium on the Theory of Computing, Las Vegas, Nevada, USA, 1995, 57-66
-
(1995)
Proceedings of the 27th Annual ACM Symposium on the Theory of Computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84957653598
-
Distributed pseudo-random functions and KDCs
-
Jacques (ed.), Lecture Notes in Computer Science 1592, Berlin: Springer-Verlag
-
Naor M., Pinkas B., Reingold O.. Distributed pseudo-random functions and KDCs. In: Jacques ed.. Advances in Cryptology-Eurocrypt '99. Lecture Notes in Computer Science 1592. Berlin: Springer-Verlag, 1999, 327-346
-
(1999)
Advances in Cryptology-Eurocrypt '99
, pp. 327-346
-
-
Naor, M.1
Pinkas, B.2
Reingold, O.3
-
6
-
-
84942779993
-
A distributed and computationally secure key distribution scheme
-
Chan A.H. and Gliger V. (ed.), Lecture Notes in Computer Science 2433, Berlin: Springer
-
Daza V., Herranz J., Padro C., Saez G.. A distributed and computationally secure key distribution scheme. In: Chan A. H., Gliger V. eds.. Information Security. Lecture Notes in Computer Science 2433. Berlin: Springer, 2002, 342-356
-
(2002)
Information Security
, pp. 342-356
-
-
Daza, V.1
Herranz, J.2
Padro, C.3
Saez, G.4
-
7
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature and encryption) ≪ cost(signature) + cost(encryption)
-
Burton S. and Kaliski Jr. (ed.), Lecture Notes in Computer Science 1294, Berlin: Springer
-
Zheng Y.. Digital signcryption or how to achieve cost (signature and encryption) ≪ cost(signature) + cost(encryption). In: Burton S., Kaliski Jr. eds.. Advanced in Cryptology-CRYPTO'97. Lecture Notes in Computer Science 1294. Berlin: Springer, 1997. 165-179
-
(1997)
Advanced in Cryptology-CRYPTO '97
, pp. 165-179
-
-
Zheng, Y.1
-
8
-
-
0031648637
-
Using signcryption to build compact and unforgettable key establishment over an ATM network
-
San Francisco, CA, USA
-
Zheng Y., Imai H.. Using signcryption to build compact and unforgettable key establishment over an ATM network. In: Proceedings of IEEE INFOCOM'98, San Francisco, CA, USA, 1998. 411-418
-
(1998)
Proceedings of IEEE INFOCOM '98
, pp. 411-418
-
-
Zheng, Y.1
Imai, H.2
-
9
-
-
0018545449
-
How to share a secret
-
Shamir A.. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
11
-
-
49049089688
-
The security of distributed key generation in log-based Cryptosystems
-
Jacques (ed.), Lecture Notes in Computer Science 1592, Berlin: Springer-Verlag
-
Gennaro R., Jarecki S., Krawczyk H., Rabin T.. The security of distributed key generation in log-based Cryptosystems. In: Jacques ed.. Advances in Cryptology-Eurocrypt '99. Lecture Notes in Computer Science 1592. Berlin: Springer-Verlag, 1999, 295-310
-
(1999)
Advances in Cryptology-Eurocrypt '99
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
12
-
-
84982943258
-
Non-Interactive and information-theoretic Secure Verifiable secret sharing
-
Feigenbum (ed.), Lecture Notes in Computer Science 576, Berlin: Springer-Verlag
-
Pedersen T.. Non-Interactive and information-theoretic Secure Verifiable secret sharing. In: Feigenbum ed.. Advances in Cryptology-Crypto'91. Lecture Notes in Computer Science 576. Berlin: Springer-Verlag, 1992, 129-140
-
(1992)
Advances in Cryptology-Crypto '91
, pp. 129-140
-
-
Pedersen, T.1
-
14
-
-
35248836947
-
A signature scheme as secure as the Diffie-Hellman problem
-
Biliam E. (ed.), Lecture Notes in Computer Science 2656, Berlin, Springer-Verlag
-
Goh Eu-Jin, Jarecki S.. A signature scheme as secure as the Diffie-Hellman problem. In: Biliam E. ed.. Advances in Cryptology-EUROCRYPT 2003. Lecture Notes in Computer Science 2656. Berlin, Springer-Verlag, 2003, 401-415
-
(2003)
Advances in Cryptology-EUROCRYPT 2003
, pp. 401-415
-
-
Goh, E.-J.1
Jarecki, S.2
-
15
-
-
84958982846
-
Formal proofs for the security of signcryption
-
Naccade D. and Pailler P. (ed.), Lecture Notes in Computer Science 2274, Berlin: Springer-Verlag
-
Baek J., Steinfield R., Zheng Y.. Formal proofs for the security of signcryption. In: Naccade D., Pailler P. eds.. Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2002). Lecture Notes in Computer Science 2274. Berlin: Springer-Verlag, 2002, 80-98
-
(2002)
Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2002)
, pp. 80-98
-
-
Baek, J.1
Steinfield, R.2
Zheng, Y.3
|