-
1
-
-
35248869043
-
-
Available as IACR eprint archive Report 2001/002, January
-
M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko. The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. Available as IACR eprint archive Report 2001/002, http://eprint.iacr.org/2001/002/, January 2001.
-
(2001)
The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
3
-
-
84937408891
-
GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks
-
Berlin, Springer-Verlag
-
M. Bellare and A. Palacio. GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In Advances in Cryptology—Crypto’02, volume 2442 of Lecture Notes in Computer Science, pages 162–177, Berlin, 2002. Springer-Verlag.
-
(2002)
Advances in Cryptology—Crypto’02, volume 2442 of Lecture Notes in Computer Science
, pp. 162-177
-
-
Bellare, M.1
Palacio, A.2
-
5
-
-
84947906522
-
The exact security of digital signatures—how to sign with RSA and Rabin
-
U. Maurer, editor, pages Springer-Verlag
-
M. Bellare and P. Rogaway. The exact security of digital signatures—how to sign with RSA and Rabin. In U. Maurer, editor, Advances in Cryptology—Eurocrypt 1996, volume 1070 of Lecture Notes in Computer Science, pages 399–416. Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology—Eurocrypt 1996, volume 1070 of Lecture Notes in Computer Science
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
0003030602
-
Coin flipping by telephone
-
M. Blum. Coin flipping by telephone. In IEEE Spring COMPCOM, pages 133–137, 1982.
-
(1982)
IEEE Spring COMPCOM
, pp. 133-137
-
-
Blum, M.1
-
10
-
-
0002181960
-
Digital multisignatures
-
Oxford University Press
-
C. Boyd. Digital multisignatures. In IMA Conference on Cryptography and Coding, pages 241–246. Oxford University Press, 1989.
-
(1989)
IMA Conference on Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
15
-
-
0003629991
-
-
U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April
-
FIPS 180-1. Secure Hash Standard. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April 1995.
-
(1995)
Secure Hash Standard
-
-
-
16
-
-
0003508562
-
-
U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA
-
FIPS 186. Digital Signature Standard. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, 1994.
-
(1994)
Digital Signature Standard
-
-
-
17
-
-
84958676203
-
Proactive RSA
-
Berlin, Springer-Verlag
-
Y. Frankel, P. Gemmell, P. MacKenzie, and M. Yung. Proactive RSA. In Advances in Cryptology—Crypto’97, volume 1294 of Lecture Notes in Computer Science, pages 440–454, Berlin, 1997. Springer-Verlag.
-
(1997)
Advances in Cryptology—Crypto’97, volume 1294 of Lecture Notes in Computer Science
, pp. 440-454
-
-
Frankel, Y.1
Gemmell, P.2
MacKenzie, P.3
Yung, M.4
-
19
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17(2):281–308, 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
21
-
-
0030646698
-
Proactive public key and signature schemes
-
ACM
-
A. Herzberg, M. Jacobsson, S. Jarecki, H. Krawczyk, and M. Yung. Proactive public key and signature schemes. In Fourth ACM Conference on Computer and Communication Security, pages 100–110. ACM, 1997.
-
(1997)
Fourth ACM Conference on Computer and Communication Security
, pp. 100-110
-
-
Herzberg, A.1
Jacobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
22
-
-
0023964787
-
Scale and performance in a distributed file system
-
February
-
J. H. Howard, M. L. Kazar, S. G. Menees, D. A. Nichols, M. Satyanarayanan, R. N. Sidebotham, and M. J. West. Scale and performance in a distributed file system. ACM Transactions on Computer Systems, 6(1):51–81, February 1988.
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 51-81
-
-
Howard, J. H.1
Kazar, M. L.2
Menees, S. G.3
Nichols, D. A.4
Satyanarayanan, M.5
Sidebotham, R. N.6
West, M. J.7
-
25
-
-
0035747336
-
Delegation of cryptographic servers for capture-resilient devices
-
ACM, Full version
-
P. MacKenzie and M. Reiter. Delegation of cryptographic servers for capture-resilient devices. In Eight ACM Conference on Computer and Communication Security, pages 10–19. ACM, 2001. Full version available at: ftp://dimacs.rutgers.edu/pub/dimacs/TechnicalReports/TechReports/2001/2001-37.ps.gz.
-
(2001)
Eight ACM Conference on Computer and Communication Security
, pp. 10-19
-
-
MacKenzie, P.1
Reiter, M.2
-
28
-
-
0042352260
-
Separating key management from file system security
-
Kiawa Island, SC, ACM
-
D. Mazières, M. Kaminsky, M. F. Kaashoek, and E. Witchel. Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating Systems Principles, pages 124–139, Kiawa Island, SC, 1999. ACM.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles
, pp. 124-139
-
-
Mazières, D.1
Kaminsky, M.2
Kaashoek, M. F.3
Witchel, E.4
-
30
-
-
0000901529
-
Security Arguments for Digital Signatures and Blind Signatures
-
D. Pointcheval and J. Stern. Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology, 13(3):361–396, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
32
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161–174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.1
-
33
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Dallas, TX, February USENIX
-
J. G. Steiner, B. C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the Winter 1988 USENIX, pages 191–202, Dallas, TX, February 1988. USENIX.
-
(1988)
Proceedings of the Winter 1988 USENIX
, pp. 191-202
-
-
Steiner, J. G.1
Neuman, B. C.2
Schiller, J. I.3
-
34
-
-
0019080452
-
A modification of the RSA public-key encryption procedure
-
November
-
H. C. Williams. A modification of the RSA public-key encryption procedure. IEEE Transactions on Information Theory, IT-26(6):726–729, November 1980.
-
(1980)
IEEE Transactions on Information Theory
, vol.IT-26
, Issue.6
, pp. 726-729
-
-
Williams, H. C.1
-
37
-
-
85084164692
-
SSH – secure login connections over the Internet
-
San Jose, CA, July
-
T. Ylönen. SSH – secure login connections over the Internet. In Proceedings of the 6th USENIX Security Symposium, pages 37–42, San Jose, CA, July 1996.
-
(1996)
Proceedings of the 6th USENIX Security Symposium
, pp. 37-42
-
-
Ylönen, T.1
|