-
2
-
-
0036949106
-
Constant-round coin-tossing with a man in the middle or realizing the shared random string model
-
B. Barak. Constant-round coin-tossing with a man in the middle or realizing the shared random string model. In Proc. 43rd IEEE Symp. on Foundations of Computer Science, pp. 345-355, 2002
-
(2002)
Proc. 43rd IEEE Symp. on Foundations of Computer Science
, pp. 345-355
-
-
Barak, B.1
-
4
-
-
84957360970
-
Collision-free accumulators and fail-stop signature schemes without trees
-
LNCS 1233
-
N. Barić and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In Advances in Cryptology - EUROCRYPT'97 (LNCS 1233), pp. 480-494, 1997.
-
(1997)
Advances in Cryptology - EUROCRYPT'97
, pp. 480-494
-
-
Barić, N.1
Pfitzmann, B.2
-
5
-
-
84945138489
-
Identification protocols secure against reset attacks
-
LNCS 2045
-
M. Bellare, M. Fischlin, S. Goldwasser, and S. Micali. Identification protocols secure against reset attacks. In Advances in Cryptology - EUROCRYPT 2001 (LNCS 2045), pp. 495-511, 2001.
-
(2001)
Advances in Cryptology - EUROCRYPT 2001
, pp. 495-511
-
-
Bellare, M.1
Fischlin, M.2
Goldwasser, S.3
Micali, S.4
-
7
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
LNCS 1807
-
F. Boudot. Efficient proofs that a committed number lies in an interval. In Advances in Cryptology - EUROCRYPT 2000 (LNCS 1807), pp. 431-444, 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000
, pp. 431-444
-
-
Boudot, F.1
-
9
-
-
84921060028
-
Separability and efficiency for generic group signature schemes
-
LNCS 1666
-
J. Camenisch and M. Michels. Separability and efficiency for generic group signature schemes. In Advances in Cryptology - CRYPTO'99 (LNCS 1666), pages 414-430, 1999.
-
(1999)
Advances in Cryptology - CRYPTO'99
, pp. 414-430
-
-
Camenisch, J.1
Michels, M.2
-
10
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally composable security: a new paradigm for cryptographic protocols. In Proc. 42nd IEEE Symp. on Foundations of Computer Science, pp. 136-145, 2001.
-
(2001)
Proc. 42nd IEEE Symp. on Foundations of Computer Science
, pp. 136-145
-
-
Canetti, R.1
-
12
-
-
0034830279
-
Concurrent zero-knowledge requires Ω̃(log n) rounds
-
R. Canetti, J. Kilian, E. Petrank, and A. Rosen. Concurrent zero-knowledge requires Ω̃(log n) rounds. In Proc. 33rd ACM Symp. on Theory of Computing, pp. 570-579, 2001.
-
(2001)
Proc. 33rd ACM Symp. on Theory of Computing
, pp. 570-579
-
-
Canetti, R.1
Kilian, J.2
Petrank, E.3
Rosen, A.4
-
13
-
-
0036038991
-
Universally composable two-party computation
-
Full version in ePrint archive, Report 2002/140
-
R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai. Universally composable two-party computation. In Proc. 34th ACM Symp. on Theory of Computing, pp. 494-503, 2002. Full version in ePrint archive, Report 2002/140. http://eprint.iacr.org/, 2002.
-
(2002)
Proc. 34th ACM Symp. on Theory of Computing
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
16
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
LNCS 839
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Advances in Cryptology - CRYPTO'94 (LNCS 839), pages 174-187, 1994.
-
(1994)
Advances in Cryptology - CRYPTO'94
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
17
-
-
85024261619
-
Signature scheme based on the strong RSA assumption
-
R. Cramer and V. Shoup. Signature scheme based on the strong RSA assumption. In ACM Trans. Inform. Syst. Security 3(3):161-185, 2000.
-
(2000)
ACM Trans. Inform. Syst. Security
, vol.3
, Issue.3
, pp. 161-185
-
-
Cramer, R.1
Shoup, V.2
-
18
-
-
84948970500
-
Efficient concurrent zero-knowledge in the auxiliary string model
-
LNCS 1807
-
I. Damgård. Efficient concurrent zero-knowledge in the auxiliary string model. In Advances in Cryptology - EUROCRYPT 2000 (LNCS 1807), pp. 418-430, 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000
, pp. 418-430
-
-
Damgård, I.1
-
19
-
-
84937437506
-
Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor
-
(LNCS 2442), Full version in ePrint Archive, Report 2001/091
-
I. Damgård and J. Nielsen. Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. In Advances in Cryptology - CRYPTO 2002 (LNCS 2442), pp. 581-596, 2002. Full version in ePrint Archive, Report 2001/091. http://eprint.iacr.org/, 2001.
-
(2002)
Advances in Cryptology - CRYPTO 2002
, pp. 581-596
-
-
Damgård, I.1
Nielsen, J.2
-
20
-
-
84880875026
-
Robust non-interactive zero knowledge
-
LNCS 2139
-
A. De Santis, G. Di Crescenzo, R. Ostrovsky, G. Persiano, and A. Sahai. Robust non-interactive zero knowledge. In Advances in Cryptology - CRYPTO 2001 (LNCS 2139), pp. 566-598, 2001.
-
(2001)
Advances in Cryptology - CRYPTO 2001
, pp. 566-598
-
-
De Santis, A.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
Sahai, A.5
-
22
-
-
0343337504
-
Non-malleable cryptography
-
D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. SIAM J. Comput., 30(2):391-437, 2000.
-
(2000)
SIAM J. Comput.
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
25
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, 31:469-472, 1985.
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
26
-
-
0003157491
-
On-line/off-line digital signatures
-
S. Even, O. Goldreich, and S. Micali. On-line/off-line digital signatures. J. Cryptology, 9(1):35-67 (1996).
-
(1996)
J. Cryptology
, vol.9
, Issue.1
, pp. 35-67
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
28
-
-
0003629991
-
-
FIPS 180-1. Federal Information Processing Standards Publication 180-1, U.S. Dept. of Commerce/NIST, National Technical Information Service, Springfield, Virginia
-
FIPS 180-1. Secure hash standard. Federal Information Processing Standards Publication 180-1, U.S. Dept. of Commerce/NIST, National Technical Information Service, Springfield, Virginia, 1995.
-
(1995)
Secure Hash Standard
-
-
-
29
-
-
0003508564
-
-
FIPS 186. Federal Information Processing Standards Publication 186, U.S. Dept. of Commerce/NIST, National Technical Information Service, Springfield, Virginia
-
FIPS 186. Digital signature standard. Federal Information Processing Standards Publication 186, U.S. Dept. of Commerce/NIST, National Technical Information Service, Springfield, Virginia, 1994.
-
(1994)
Digital Signature Standard
-
-
-
30
-
-
84958615646
-
Statistical zero knowledge protocols to prove modular polynomial relations
-
LNCS 1294
-
E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In Advances in Cryptology - CRYPTO'97 (LNCS 1294), pp. 16-30, 1997.
-
(1997)
Advances in Cryptology - CRYPTO'97
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
32
-
-
0029767165
-
On the composition of zero knowledge proof systems
-
O. Goldreich and H. Krawczyk. On the composition of zero knowledge proof systems. SIAM J. Comput., 25(1):169-192, 1996.
-
(1996)
SIAM J. Comput.
, vol.25
, Issue.1
, pp. 169-192
-
-
Goldreich, O.1
Krawczyk, H.2
-
34
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or All languages in NP have zero-knowledge proof systems. J. ACM, 38(3):691-729, 1991.
-
(1991)
J. ACM
, vol.38
, Issue.3
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
35
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
February
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. Comput., 18(1):186-208, February 1989.
-
(1989)
SIAM J. Comput.
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
36
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput., 17:281-308, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
37
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory
-
LNCS 330
-
L. C. Guillou and J.-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory. In Advances in Cryptology - EUROCRYPT'88 (LNCS 330), pp. 123-128, 1988
-
(1988)
Advances in Cryptology - EUROCRYPT'88
, pp. 123-128
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
38
-
-
84948968753
-
Adaptively secure threshold cryptography: Introducing concurrency, removing erasures
-
LNCS 1807
-
S. Jarecki and A. Lysyanskaya. Adaptively secure threshold cryptography: introducing concurrency, removing erasures. In Advances in Cryptology - EUROCRYPT 2000 (LNCS 1807), pp. 221-242, 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000
, pp. 221-242
-
-
Jarecki, S.1
Lysyanskaya, A.2
-
40
-
-
35248878052
-
Efficient and non-malleable proofs of plaintext knowledge and applications
-
LNCS 2656
-
J. Katz. Efficient and non-malleable proofs of plaintext knowledge and applications. In Advances in Cryptology - EUROCRYPT 2003 (LNCS 2656), pp. 211-228, 2003.
-
(2003)
Advances in Cryptology - EUROCRYPT 2003
, pp. 211-228
-
-
Katz, J.1
-
41
-
-
0034830278
-
Concurrent and resettable zero-knowledge in poly-logarithmic rounds
-
J. Kilian and E. Petrank. Concurrent and resettable zero-knowledge in poly-logarithmic rounds. In Proc. 33rd ACM Symp. on Theory of Computing, pp. 560-569, 2001.
-
(2001)
Proc. 33rd ACM Symp. on Theory of Computing
, pp. 560-569
-
-
Kilian, J.1
Petrank, E.2
-
44
-
-
0000202647
-
-
In Russian. Engl. trans.
-
In Russian. Engl. trans.: Probl. Inform. Transm. 9:265-266.
-
Probl. Inform. Transm.
, vol.9
, pp. 265-266
-
-
-
48
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
M. Naor and M. Yung. Public-key cryptosystems provably secure against chosen ciphertext attacks. In Proc. 22nd ACM Symp. on Theory of Computing, pp. 427-437, 1990.
-
(1990)
Proc. 22nd ACM Symp. on Theory of Computing
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
49
-
-
0001412930
-
A new public-key cryptosystem as secure as factoring
-
LNCS 1403
-
T. Okamolo and S. Uchiyama. A new public-key cryptosystem as secure as factoring. In Advances in Cryptology - EUROCRYPT'98 (LNCS 1403), pp. 380-318, 1998.
-
(1998)
Advances in Cryptology - EUROCRYPT'98
, pp. 380-1318
-
-
Okamolo, T.1
Uchiyama, S.2
-
50
-
-
84942550998
-
Public-key cryptosystems based on composite degree residue classes
-
LNCS 1592
-
P. Paillier. Public-key cryptosystems based on composite degree residue classes. In Advances in Cryptology - EUROCRYPT'99 (LNCS 1592), pp. 223-238, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT'99
, pp. 223-238
-
-
Paillier, P.1
-
51
-
-
84982943258
-
Non-interactive and informalion-theoretic secure verifiable secret sharing
-
LNCS 576
-
T. P. Pedersen. Non-interactive and informalion-theoretic secure verifiable secret sharing. In Advances in Cryptology - CRYPTO'91 (LNCS 576), pp. 129-140, 1991.
-
(1991)
Advances in Cryptology - CRYPTO'91
, pp. 129-140
-
-
Pedersen, T.P.1
-
52
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. J. Cryptology, 13(3):361-396, 2000.
-
(2000)
J. Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
56
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
J. Rompel. One-way functions are necessary and sufficient for secure signatures. In Proc. 22nd ACM Symp. on Theory of Computing, pp. 387-394, 1990.
-
(1990)
Proc. 22nd ACM Symp. on Theory of Computing
, pp. 387-394
-
-
Rompel, J.1
-
57
-
-
0033342534
-
Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
-
A. Sahai. Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In Proc. 40th IEEE Symp. on Foundations of Computer Science, pp. 543-553, 1999.
-
(1999)
Proc. 40th IEEE Symp. on Foundations of Computer Science
, pp. 543-553
-
-
Sahai, A.1
-
58
-
-
85032873931
-
Efficient identification and signatures for smart cards
-
LNCS 434
-
C. P. Schnorr. Efficient identification and signatures for smart cards. In Advances in Cryptology - EUROCRYPT'89 (LNCS 434), pp. 688-689, 1989.
-
(1989)
Advances in Cryptology - EUROCRYPT'89
, pp. 688-689
-
-
Schnorr, C.P.1
|