-
3
-
-
0001229355
-
A Forward-Secure Digital Signature Scheme
-
M. Bellare and S. Miner. A Forward-Secure Digital Signature Scheme. Crypto'99.
-
Crypto'99
-
-
Bellare, M.1
Miner, S.2
-
5
-
-
0000090958
-
The exact security of digital signatures: How to sign with RSA and Rabin
-
M. Bellare and P. Rogaway. The exact security of digital signatures: How to sign with RSA and Rabin. Eurocrypt'96.
-
Eurocrypt'96
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
0000556454
-
Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attack
-
S. Bellovin and M. Merritt. Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attack. IEEE Security and Privacy'92.
-
IEEE Security and Privacy'92
-
-
Bellovin, S.1
Merritt, M.2
-
8
-
-
85084163661
-
A Method for Fast Revocation of Public Key Certificates and Security Capabilities
-
D. Boneh, X. Ding, G. Tsudik, and C. Wong. A Method for Fast Revocation of Public Key Certificates and Security Capabilities. Usenix Security'01.
-
Usenix Security'01
-
-
Boneh, D.1
Ding, X.2
Tsudik, G.3
Wong, C.4
-
9
-
-
0002181960
-
Digital Multisignatures
-
C. Boyd. Digital Multisignatures. Cryptography and Coding, pp 241-246, 1989.
-
(1989)
Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
10
-
-
28144462281
-
Universally Composable Security: A New Paradigm for Cryptographic Protocols
-
R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. IEEE FOCS'01.
-
IEEE FOCS'01
-
-
Canetti, R.1
-
13
-
-
0000613666
-
A Practical Scheme for Non-Interactive Verifiable Secret Sharing
-
P. Feldman. A Practical Scheme for Non-Interactive Verifiable Secret Sharing. IEEE FOGS'87.
-
IEEE FOGS'87
-
-
Feldman, P.1
-
15
-
-
35248872821
-
Yaksha: Augmenting Kerberos with Public Key Cryptography
-
R. Ganesan. Yaksha: Augmenting Kerberos with Public Key Cryptography. NDSS'95.
-
NDSS'95
-
-
Ganesan, R.1
-
17
-
-
0023985465
-
A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks
-
S. Goldwasser, S. Micali, and R. Rivest. A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks. SIAM J. Comput., (17)2, 1988, pp 281-308.
-
(1988)
SIAM J. Comput.
, vol.2
, Issue.17
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
20
-
-
0037885445
-
Forward-Secure Signatures with Optimal Signing and Verifying
-
G. Itkis and L. Reyzin. Forward-Secure Signatures with Optimal Signing and Verifying. Crypto'01.
-
Crypto'01
-
-
Itkis, G.1
Reyzin, L.2
-
21
-
-
84871980827
-
SiBIR: Signer-Base Intrusion-Resilient Signatures
-
G. Itkis and L. Reyzin. SiBIR: Signer-Base Intrusion-Resilient Signatures. Crypto'02.
-
Crypto'02
-
-
Itkis, G.1
Reyzin, L.2
-
22
-
-
35248874661
-
Password Authentication using Multiple Servers
-
D. Jablon. Password Authentication using Multiple Servers. RSA-CT'01.
-
RSA-CT'01
-
-
Jablon, D.1
-
23
-
-
84880882264
-
Practical Password-Authenticated Key Exchange Provably Secure under Standard Assumptions
-
J. Katz, R. Ostrovsky, and M. Yung. Practical Password-Authenticated Key Exchange Provably Secure under Standard Assumptions. Eurocrypt'01.
-
Eurocrypt'01
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
24
-
-
85088332284
-
Simple Forward-Secure Signatures from any Signature Schemes
-
H. Krawczyk. Simple Forward-Secure Signatures from any Signature Schemes. ACM CCS'00.
-
ACM CCS'00
-
-
Krawczyk, H.1
-
28
-
-
0000845043
-
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
-
T. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. Crypto'91.
-
Crypto'91
-
-
Pedersen, T.1
-
29
-
-
33645748660
-
Secure Password-based Protocol for Downloading a Private Key
-
R. Perlman and C. Kaufman. Secure Password-based Protocol for Downloading a Private Key. NDSS'99.
-
NDSS'99
-
-
Perlman, R.1
Kaufman, C.2
-
30
-
-
0342779118
-
A Simplified Approach to Threshold and Proactive RSA
-
T. Rabin. A Simplified Approach to Threshold and Proactive RSA. Crypto'98.
-
Crypto'98
-
-
Rabin, T.1
-
31
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R. A. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. C. ACM. (21)2, 1978, pp 120-126.
-
(1978)
C. ACM
, vol.2
, Issue.21
, pp. 120-126
-
-
Rivest, R.A.1
Shamir, A.2
Adleman, L.3
-
32
-
-
33847249887
-
Password-Enabled PKI: Virtual Smart-cards versus Virtual Soft Tokens
-
R. Sandhu, M. Bellare, and Ravi Ganesan. Password-Enabled PKI: Virtual Smart-cards versus Virtual Soft Tokens. PKI Research Workshop. 2002.
-
(2002)
PKI Research Workshop
-
-
Sandhu, R.1
Bellare, M.2
Ganesan, R.3
-
33
-
-
12344258539
-
Efficient Signature Generation by Smart Cards
-
C. P. Schnorr. Efficient Signature Generation by Smart Cards. J. Cryptology, 1991.
-
(1991)
J. Cryptology
-
-
Schnorr, C.P.1
-
34
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. How to Share a Secret. C. ACM, 22(11):612-613, 1979.
-
(1979)
C. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
35
-
-
0001000209
-
Practical Threshold Signatures
-
V. Shoup. Practical Threshold Signatures. Eurocrypt'00.
-
Eurocrypt'00
-
-
Shoup, V.1
-
37
-
-
84957021432
-
On the Dark Side of Threshold Cryptography
-
S. Xu and M. Yung. On the Dark Side of Threshold Cryptography. Financial Crypto'02.
-
Financial Crypto'02
-
-
Xu, S.1
Yung, M.2
|