-
1
-
-
85062838317
-
Safeguarding cryptographic keys
-
American Federation of Information Processing Societies Proceedings
-
BLAKLEY, G. R. 1979. Safeguarding cryptographic keys. In Proceedings of the National Computer Conference, 48. American Federation of Information Processing Societies Proceedings, 313-317.
-
(1979)
Proceedings of the National Computer Conference
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
2
-
-
0002181960
-
Digital multisignatures
-
H. Baker and F. Piper, Eds. Clarendon Press
-
BOYD, C. 1989. Digital multisignatures. In Cryptography and Coding, H. Baker and F. Piper, Eds. Clarendon Press, pp. 241-246.
-
(1989)
Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
4
-
-
0038687710
-
Asynchronous verifiable secret sharing and proactive cryptosystems
-
ACM Press, New York (Nov.)
-
CACHIN, C., KURSAWE, K., LYSYANSKAYA, A., AND STROBL, R. 2002. Asynchronous verifiable secret sharing and proactive cryptosystems. In Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM Press, New York (Nov.), 88-97.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 88-97
-
-
Cachin, C.1
Kursawe, K.2
Lysyanskaya, A.3
Strobl, R.4
-
5
-
-
84880899710
-
Secure and efficient asynchronous broadcast protocols
-
J. Kilian, Ed. Lecture Notes in Computer Science. Springer-Verlag
-
CACHIN, C., KURSAWE, K., PETZOLD, F., AND SHOUP, V. 2001. Secure and efficient asynchronous broadcast protocols (extended abstract). In Advances in Cryptology - Crypto'2001, J. Kilian, Ed. Lecture Notes in Computer Science, vol. 2139. Springer-Verlag, 524-541.
-
(2001)
Advances in Cryptology - Crypto'2001
, vol.2139
, pp. 524-541
-
-
Cachin, C.1
Kursawe, K.2
Petzold, F.3
Shoup, V.4
-
6
-
-
0342880858
-
-
PhD thesis, Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, Israel (June)
-
CANETTI, R. 1995. Studies in Secure Multiparty Computation and Applications. PhD thesis, Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, Israel (June).
-
(1995)
Studies in Secure Multiparty Computation and Applications
-
-
Canetti, R.1
-
7
-
-
0029723583
-
Adaptively secure multi-party computation
-
ACM Press, New York
-
CANETTI, R., FEIGE, U., GOLDREICH, O., AND NAOR, M. 1996. Adaptively secure multi-party computation. In Proceedings of the 28th Annual ACM Symposium on Theory of Computing. ACM Press, New York, 639-648.
-
(1996)
Proceedings of the 28th Annual ACM Symposium on Theory of Computing
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
8
-
-
0013001552
-
Proactive security: Long-term protection against break-ins
-
CANETTI, R., GENNARO, R., HERZBERG, A., AND NAOR, D. 1997. Proactive security: Long-term protection against break-ins. CryptoBytes (The Technical Newsletter of RSA Laboratories, A Division of RSA Data Security Inc.) 3, 1, 1-8.
-
(1997)
CryptoBytes (The Technical Newsletter of RSA Laboratories, a Division of RSA Data Security Inc.)
, vol.3
, Issue.1
, pp. 1-8
-
-
Canetti, R.1
Gennaro, R.2
Herzberg, A.3
Naor, D.4
-
9
-
-
0345757358
-
Practical Byzantine fault tolerance and proactive recovery
-
CASTRO, M. AND LISKOV, B. 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20, 4 (Nov.), 398-461.
-
(2002)
ACM Trans. Comput. Syst.
, vol.20
, Issue.4 NOV
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
10
-
-
0003027707
-
Verifiable secret sharing and achieving simultaneous broadcast
-
CHOR, B., GOLDWASSER, S., MACALI, S., AND AWERBUCH, B. 1985. Verifiable secret sharing and achieving simultaneous broadcast. In Proceedings of the 26th Symposium on Foundations of Computer Science. 335-344.
-
(1985)
Proceedings of the 26th Symposium on Foundations of Computer Science
, pp. 335-344
-
-
Chor, B.1
Goldwasser, S.2
Macali, S.3
Awerbuch, B.4
-
11
-
-
84976713553
-
Concurrent control with readers and writers
-
COURTOIS, P., HEYMANS, F., AND PARNAS, D. 1971. Concurrent control with readers and writers. Communications of the ACM 14, 10 (Oct.), 667-668.
-
(1971)
Communications of the ACM
, vol.14
, Issue.10 OCT
, pp. 667-668
-
-
Courtois, P.1
Heymans, F.2
Parnas, D.3
-
12
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
C. Pomerance, Ed. Advances in Cryptology - Crypto'87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, CA (Aug.) 16-20, 1987, Springer-Verlag
-
DESMEDT, Y. 1988. Society and group oriented cryptography: A new concept. In C. Pomerance, Ed. Advances in Cryptology - Crypto'87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, CA (Aug.) 16-20, 1987, Vol. 293 of Lecture Notes in Computer Science, Springer-Verlag, pp. 120-127.
-
(1988)
Lecture Notes in Computer Science
, vol.293
, pp. 120-127
-
-
Desmedt, Y.1
-
13
-
-
0038061165
-
Redistributing secret shares to new access structures and its applications
-
George Mason University, July
-
DESMEDT, Y. AND JAJODIA, S. 1997. Redistributing secret shares to new access structures and its applications. Technical Report ISSE_TR-97-01, George Mason University, July.
-
(1997)
Technical Report
, vol.ISSE-TR-97-01
-
-
Desmedt, Y.1
Jajodia, S.2
-
15
-
-
0022045868
-
Impossibility of distributed consensus with one faulty processor
-
FISCHER, M. J., LYNCH, N. A., AND PETERSON, M. S. 1985. Impossibility of distributed consensus with one faulty processor. Journal of the ACM 32, 2 (Apr.), 374-382.
-
(1985)
Journal of the ACM
, vol.32
, Issue.2 APR
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Peterson, M.S.3
-
16
-
-
0031375570
-
Optimal resilience proactive public-key cryptosystems
-
Miami Beach, FL, (Oct.) 20-22. IEEE
-
FRANKEL, Y., GEMMEL, P., MACKENZIE, P., AND YUNG, M. 1997a. Optimal resilience proactive public-key cryptosystems. In Proceedings of the 38th Symposium on Foundations of Computer Science, Miami Beach, FL, (Oct.) 20-22. IEEE, pp. 384-393.
-
(1997)
Proceedings of the 38th Symposium on Foundations of Computer Science
, pp. 384-393
-
-
Frankel, Y.1
Gemmel, P.2
Mackenzie, P.3
Yung, M.4
-
17
-
-
84958676203
-
Proactive RSA
-
B. Kaliski, Ed. Lecture Notes in Computer Science Santa Barbara, California (Aug.). Springer-Verlag
-
FRANKEL, Y., GEMMELL, P., MACKENZIE, P., AND YUNG, M. 1997b. Proactive RSA. In Advances in Cryptology - Crypto'97, B. Kaliski, Ed. Lecture Notes in Computer Science vol. 1294, Santa Barbara, California (Aug.). Springer-Verlag, pp. 440-454.
-
(1997)
Advances in Cryptology - Crypto'97
, vol.1294
, pp. 440-454
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
18
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
D. Coppersmith, Ed. Lecture Notes in Computer Science Santa Barbara, California (Aug.). Springer-Verlag
-
HERZBERG, A., JARECKI, S., KRAWCZYK, H., AND YUNG, M. 1995. Proactive secret sharing or: How to cope with perpetual leakage. In Advances in Cryptology - Crypto '95, D. Coppersmith, Ed. Lecture Notes in Computer Science vol. 963, Santa Barbara, California (Aug.). Springer-Verlag, 457-469.
-
(1995)
Advances in Cryptology - Crypto '95
, vol.963
, pp. 457-469
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
19
-
-
0030646698
-
Proactive public-key and signature schemes
-
ACM, New York
-
HERZBERG, A., JAKOBSSON, M., JARECKI, S., KRAWCZYK, H., AND YUNG, M. 1997. Proactive public-key and signature schemes. In Proceedings of the Fourth Annual Conference on Computer Communications Security. ACM, New York, 100-110.
-
(1997)
Proceedings of the Fourth Annual Conference on Computer Communications Security
, pp. 100-110
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
20
-
-
33745999816
-
Player simulation and general adversary structures in perfect multi-party computation
-
HIRT, M. AND MAURER, U. 2000. Player simulation and general adversary structures in perfect multi-party computation. Journal of Cryptology 13, 1, 31-60.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 31-60
-
-
Hirt, M.1
Maurer, U.2
-
21
-
-
0023543848
-
Secret sharing scheme realizing general access structure
-
Tokyo, Japan (Nov.)
-
ITO, M., SAITO, A., AND NISHIZEKI, T. 1987. Secret sharing scheme realizing general access structure. In Proceedings of IEEE Global Communication Conference (GLOBALCOM'87), Tokyo, Japan (Nov.), 99-102.
-
(1987)
Proceedings of IEEE Global Communication Conference (GLOBALCOM'87)
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
22
-
-
0010316932
-
-
Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (Sept.)
-
JARECKI, S. 1995. Proactive secret sharing and public key cryptosystems. Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (Sept.).
-
(1995)
Proactive Secret Sharing and Public Key Cryptosystems
-
-
Jarecki, S.1
-
23
-
-
0017555081
-
Concurrent reading while writing
-
LAMPORT, L. 1977. Concurrent reading while writing. Communications of the ACM 20, 11, 806-811.
-
(1977)
Communications of the ACM
, vol.20
, Issue.11
, pp. 806-811
-
-
Lamport, L.1
-
24
-
-
0021654066
-
Byzantine clock synchronization
-
Vancouver, British Columbia, Canada. ACM Press, New York
-
LAMPORT, L. AND MELLIAR-SMITH, P. M. 1984. Byzantine clock synchronization. In Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing, Vancouver, British Columbia, Canada. ACM Press, New York, 68-74.
-
(1984)
Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing
, pp. 68-74
-
-
Lamport, L.1
Melliar-Smith, P.M.2
-
25
-
-
0032306029
-
Byzantine quorum systems
-
MALKHI, D. AND REITER, M. 1998. Byzantine quorum systems. Distributed Computing 11, 4, 203-213.
-
(1998)
Distributed Computing
, vol.11
, Issue.4
, pp. 203-213
-
-
Malkhi, D.1
Reiter, M.2
-
27
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
J. Feigenbaum, Ed. Lecture Notes in Computer Science, Santa Barbara, California (Aug.). Springer-Verlag
-
PEDERSEN, T. 1992. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology - Crypto'91, J. Feigenbaum, Ed. Lecture Notes in Computer Science vol. 576, Santa Barbara, California (Aug.). Springer-Verlag, 129-140.
-
(1992)
Advances in Cryptology - Crypto'91
, vol.576
, pp. 129-140
-
-
Pedersen, T.1
-
28
-
-
84957689308
-
A simplified approach to threshold and proactive RSA
-
H. Krawczyk Ed. Lecture Notes in Computer Science, Santa Barbara, California (Aug.). Springer-Verlag
-
RABIN, T. 1998. A simplified approach to threshold and proactive RSA. In Advances in Cryptology - Crypto'98, H. Krawczyk Ed. Lecture Notes in Computer Science vol. 1462, Santa Barbara, California (Aug.). Springer-Verlag, 89-104.
-
(1998)
Advances in Cryptology - Crypto'98
, vol.1462
, pp. 89-104
-
-
Rabin, T.1
-
29
-
-
84948956297
-
The Rampart toolkit for building high-integrity services
-
K. P. Birman, F. Mattern, and A. Schiper, Eds. Theory and Practice in Distributed Systems, International Workshop, Selected Papers, Berlin, Germany, Springer-Verlag
-
REITER, M. K. 1995. The Rampart toolkit for building high-integrity services. In K. P. Birman, F. Mattern, and A. Schiper, Eds. Theory and Practice in Distributed Systems, International Workshop, Selected Papers, Vol. 938 of Lecture Notes in Computer Science, Berlin, Germany, Springer-Verlag, 99-110.
-
(1995)
Lecture Notes in Computer Science
, vol.938
, pp. 99-110
-
-
Reiter, M.K.1
-
30
-
-
0030126124
-
Distributing trust with the Rampart toolkit
-
REITER, M. K. 1996. Distributing trust with the Rampart toolkit. Communications of the ACM 39, 4 (Apr.), 71-74.
-
(1996)
Communications of the ACM
, vol.39
, Issue.4 APR
, pp. 71-74
-
-
Reiter, M.K.1
-
31
-
-
0003976812
-
Understanding protocols for Byzantine clock synchronization
-
Computer Science Department, Cornell University, New York
-
SCHNEIDER, F. B. 1987. Understanding protocols for Byzantine clock synchronization. Technical Report TR 87-859, Computer Science Department, Cornell University, New York,
-
(1987)
Technical Report
, vol.TR 87-859
-
-
Schneider, F.B.1
-
32
-
-
0018545449
-
How to share a secret
-
SHAMIR, A. 1979. How to share a secret. Communications of the ACM 22, 11 (Nov.), 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11 NOV
, pp. 612-613
-
-
Shamir, A.1
-
33
-
-
33645459930
-
Verifiable secret redistribution for threshold sharing schemes
-
School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, February 2002
-
WONG, T. M., WANG, C., AND WING, J. M. 2002. Verifiable secret redistribution for threshold sharing schemes. Technical Report CMU-CS-02-114, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, February 2002.
-
(2002)
Technical Report
, vol.CMU-CS-02-114
-
-
Wong, T.M.1
Wang, C.2
Wing, J.M.3
-
34
-
-
0347763999
-
-
PhD thesis, Computer Science Department, Cornell University, Ithaca, New York (May)
-
ZHOU, L. 2001. Towards building secure and fault-tolerant on-line services. PhD thesis, Computer Science Department, Cornell University, Ithaca, New York (May).
-
(2001)
Towards Building Secure and Fault-tolerant On-line Services
-
-
Zhou, L.1
-
35
-
-
0347764000
-
APSS: Proactive secret sharing in asynchronous systems
-
Computer Science Department (Oct.), Cornell University, Ithaca, New York
-
ZHOU, L., SCHNEIDER, F. B., AND VAN RENESSE, R. 2002a. APSS: Proactive secret sharing in asynchronous systems. Technical Report TR 2002-1877, Computer Science Department (Oct.), Cornell University, Ithaca, New York.
-
(2002)
Technical Report
, vol.TR 2002-1877
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
-
36
-
-
0345757359
-
COCA: A secure distributed on-line certification authority
-
ZHOU, L., SCHNEIDER, F. B., AND VAN RENESSE, R. 2002b. COCA: A secure distributed on-line certification authority. ACM Transactions on Computer Systems 20, 4 (Nov.), 329-368.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4 NOV
, pp. 329-368
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
|