-
1
-
-
84858659532
-
A digital signature scheme based on linear error-correcting block codes
-
Josef Pieprzyk and Reihanah Safavi-Naini (eds.), Springer-Verlag LNCS no. 917
-
M. Alabbadi and S. B. Wicker, A digital signature scheme based on linear error-correcting block codes. In Josef Pieprzyk and Reihanah Safavi-Naini (eds.), Asiacrypt '94, Springer-Verlag (1994) LNCS no. 917, pp. 238-248.
-
(1994)
Asiacrypt '94
, pp. 238-248
-
-
Alabbadi, M.1
Wicker, S.B.2
-
2
-
-
0026626314
-
Experimental quantum cryptography
-
C. H. Bennett, F. Bessette, G. Brassard, G. Savail and J. Smolin, Experimental quantum cryptography, J. Cryptol. Vol. 5, no. 1 (1992), pp. 3-28.
-
(1992)
J. Cryptol.
, vol.5
, Issue.1
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Savail, G.4
Smolin, J.5
-
3
-
-
0013056120
-
Practical quantum oblivious transfer protocols
-
J. Feigenbaum (ed.), Springer-Verlag. LNCS no. 576
-
C. H. Bennett, G. Brassard, C. Crépeau and M.-H. Skubiszewska, Practical quantum oblivious transfer protocols. In J. Feigenbaum (ed.), Crypto '91, Springer-Verlag (1991). LNCS no. 576, pp. 351-366.
-
(1991)
Crypto '91
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, M.-H.4
-
5
-
-
84948951675
-
Noisy polynomial interpolation and noisy Chinese remaindering
-
B. Preneel (ed.), LNCS no. 1807
-
D. Bleichenbacher and P. Nyuyen, Noisy polynomial interpolation and noisy Chinese remaindering. In B. Preneel (ed.), Eurocrypt '00, (2000) LNCS no. 1807, pp. 53-69.
-
(2000)
Eurocrypt '00
, pp. 53-69
-
-
Bleichenbacher, D.1
Nyuyen, P.2
-
6
-
-
84937550984
-
Provably secure password-authenticated key exchange using Diffle-Hellman
-
B. Preneel (ed.), Springer-Verlag LNCS no. 1807
-
V. Boyko, P. MacKenzie, and S. Patel, Provably secure password-authenticated key exchange using Diffle-Hellman. In B. Preneel (ed.), Eurocrypt '00, Springer-Verlag (2000) LNCS no. 1807, pp. 156-171.
-
(2000)
Eurocrypt '00
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
7
-
-
84957356475
-
Efficient cryptographic protocols based on noisy channels
-
W. Fumy (ed.), Springer-Verlag, LNCS no. 1233
-
C. Crépeau, Efficient cryptographic protocols based on noisy channels. In W. Fumy (ed.), Eurocrypt '97, Springer-Verlag, (1997) LNCS no. 1233, pp. 306-317.
-
(1997)
Eurocrypt '97
, pp. 306-317
-
-
Crépeau, C.1
-
12
-
-
0034140877
-
Protecting secret keys with personal entropy
-
February
-
C. Ellison, C. Hall, R. Milbert and B. Schneier, Protecting Secret Keys with Personal Entropy, J. Fut. Comput. Sys. Vol. 16, no. 4 (2000, February) pp. 311-318.
-
(2000)
J. Fut. Comput. Sys.
, vol.16
, Issue.4
, pp. 311-318
-
-
Ellison, C.1
Hall, C.2
Milbert, R.3
Schneier, B.4
-
15
-
-
0032311617
-
Improved decoding of Reed-Solomon and algebraic-geometric codes
-
IEEE Computer Society
-
V. Guruswami and M. Sudan, Improved decoding of Reed-Solomon and algebraic-geometric codes, In FOCS '98, IEEE Computer Society (1998), pp. 28-39.
-
(1998)
FOCS '98
, pp. 28-39
-
-
Guruswami, V.1
Sudan, M.2
-
16
-
-
84957694404
-
Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree
-
H. Krawczyk (ed.), Springer-Verlag LNCS no. 1462
-
T. Jakobsen, Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree, In H. Krawczyk (ed.), Crypto '98, Springer-Verlag (1998) LNCS no. 1462, pp. 212-222.
-
(1998)
Crypto '98
, pp. 212-222
-
-
Jakobsen, T.1
-
17
-
-
84955606093
-
Proving with knowing: On oblivious, agnostic, and blind-folded provers
-
N. Koblitz (ed.), Springer-Verlag LNCS no. 1109
-
M. Jakobsson and M. Yung, Proving with knowing: On oblivious, agnostic, and blind-folded provers, In N. Koblitz (ed.), Crypto '96, Springer-Verlag (1996), LNCS no. 1109, pp. 186-200.
-
(1996)
Crypto '96
, pp. 186-200
-
-
Jakobsson, M.1
Yung, M.2
-
18
-
-
85084161999
-
The design and analysis of graphical passwords
-
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter and A. D. Rubin, The design and analysis of graphical passwords, In Proceedings of the 8th USENIX Security Symposium (1999), pp. 1-14.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 1-14
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
19
-
-
0033281339
-
A fuzzy commitment scheme
-
G. Tsudik, (ed), ACM Press
-
A. Juels and M. Wattenberg, A fuzzy commitment scheme, In G. Tsudik, (ed), Sixth ACM Conference on Computer and Communications Security, ACM Press (1999), pp. 28-36.
-
(1999)
Sixth ACM Conference on Computer and Communications Security
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
21
-
-
84937740421
-
Shift register synthesis and BCH decoding
-
J. L. Massey, Shift register synthesis and BCH decoding. IEEE Trans. Inform. Theory, Vol. 15, no. 1 (1969) pp. 122-127.
-
(1969)
IEEE Trans. Inform. Theory
, vol.15
, Issue.1
, pp. 122-127
-
-
Massey, J.L.1
-
22
-
-
0003777826
-
A public-key cryptosystem based on algebraic coding theory
-
Jet Propulsion Laboratory, Pasadena
-
R. J. McEliece, A public-key cryptosystem based on algebraic coding theory, Technical Report DSN progress report 42-44, Jet Propulsion Laboratory, Pasadena (1978).
-
(1978)
Technical Report DSN Progress Report
, vol.42-44
-
-
McEliece, R.J.1
-
23
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
G. Tsudik (ed.), ACM Press
-
F. Monrose, M. K. Reiter and S. Wetzel, Password hardening based on keystroke dynamics, In G. Tsudik (ed.), Sixth ACM Conference on Computer and Communications Security, ACM Press (1999), pp. 73-82.
-
(1999)
Sixth ACM Conference on Computer and Communications Security
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
24
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
J. Feigenbaum (ed.), Springer-Verlag, LNCS no. 576
-
T. Pedersen, Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum (ed.), Crypto '91, Springer-Verlag (1991), LNCS no. 576, pp. 129-140.
-
(1991)
Crypto '91
, pp. 129-140
-
-
Pedersen, T.1
-
25
-
-
0000808175
-
Encoding and error-correction procedures for Bose-Chaudhuri codes
-
W. W. Peterson, Encoding and error-correction procedures for Bose-Chaudhuri codes, IEEE Trans. Inform. Theory, Vol. IT-60 (1960) pp. 459-470.
-
(1960)
IEEE Trans. Inform. Theory
, vol.IT-60
, pp. 459-470
-
-
Peterson, W.W.1
-
26
-
-
0035879575
-
A fair and efficient solution to the sociaset millionaires' problem
-
July
-
B. Schoenmakers, F. Boudot and J. Traoré, A fair and efficient solution to the sociaset millionaires' problem, Discrete Appl. Math. Vol. 111 (2001, July) pp. 23-36.
-
(2001)
Discrete Appl. Math.
, vol.111
, pp. 23-36
-
-
Schoenmakers, B.1
Boudot, F.2
Traoré, J.3
-
27
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Commun. ACM, Vol. 22 (1979) pp. 612-613.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
30
-
-
84955595109
-
A new identification scheme based on syndrome decoding
-
D.R. Stinson (ed.), Springer-Verlag, LNCS no. 773
-
J. Stern, A new identification scheme based on syndrome decoding, In D.R. Stinson (ed.), Crypto '93, Springer-Verlag (1993), LNCS no. 773, pp. 13-21.
-
(1993)
Crypto '93
, pp. 13-21
-
-
Stern, J.1
|