-
3
-
-
0005314588
-
Cryptographic hash functions: A Survey
-
Department of Computer Science. University of Wollongong
-
Bakhtiari, S., R. Safavi-Naini, and J. Pieprzyk: 1995, 'Cryptographic Hash Functions: A Survey', Technical Report 95-09, Department of Computer Science. University of Wollongong.
-
(1995)
Technical Report
, vol.95
, Issue.9
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
4
-
-
84983104598
-
On defining proofs of knowledge
-
E. Brickell (ed.), Springer Verlag, Berlin
-
Bellare, M. and O. Goldreich: 1993. "On Defining Proofs of Knowledge', in E. Brickell (ed.), Advances in Cryptologv: Crypto '93 Proceedings, Vol. 740, Springer Verlag, Berlin, pp. 390-420.
-
(1993)
Advances in Cryptologv: Crypto '93 Proceedings
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
5
-
-
84954417747
-
XOR MACs: New methods for message authentication using finite pseudorandom functions
-
D. Coppersmith (ed.). Springer Verlag. Berlin
-
Bellare, M., R. Guerin, and P. Rogaway: 1995, "XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions', in D. Coppersmith (ed.). Advances in Cryptologv: Crypto '95 Proceedings, Lecture Notes in Computer Science, Vol. 963. Springer Verlag. Berlin, pp. 15-28.
-
(1995)
Advances in Cryptologv: Crypto '95 Proceedings, Lecture Notes in Computer Science
, vol.963
, pp. 15-28
-
-
Bellare, M.1
Guerin, R.2
Rogaway, P.3
-
7
-
-
0035879575
-
A fair and efficient solution to the socialist millionaires' problem
-
Boudot, F., B. Schoenmakers. and I Traoré: 2001. "A Fair and Efficient Solution to the Socialist Millionaires' Problem'. Discrete Applied Mathematics 111(1-2). 23-36.
-
(2001)
Discrete Applied Mathematics
, vol.111
, Issue.1-2
, pp. 23-36
-
-
Boudot, F.1
Schoenmakers, B.2
Traoré, I.3
-
8
-
-
0025386404
-
A logic of authentication
-
Burrows, M., M. Abadi, and R. Needham: 1990. "A Logic of Authentication'. ACM Transactions on Computer Systems 8(1), 18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
10
-
-
85028868533
-
Collision free hash functions and public key signature schemes
-
D. Chaurn and W. Price (eds.). Springer Verlag, Berlin
-
Damgård. I.: 1988. "Collision Free Hash Functions and Public Key Signature Schemes', in D. Chaurn and W. Price (eds.). EUROCRYPT. Lecture Notes in Computer Science, Vol. 304. Springer Verlag, Berlin, pp. 203-216.
-
(1988)
EUROCRYPT. Lecture Notes in Computer Science
, vol.304
, pp. 203-216
-
-
Damgård, I.1
-
11
-
-
0030150177
-
Comparing information without leaking it
-
Fagin, R., M. Naor, and P. Winkler: 1996, 'Comparing Information Without Leaking It', Communications of the ACM 39(5). 77-85.
-
(1996)
Communications of the ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
12
-
-
33646492430
-
Cryptographic protection of databases and software
-
.T. Feigenbaum and M. Merritt (eds.).
-
Feigenbaum. J., M. Liberman, and R. Wright: 1991. 'Cryptographic Protection of Databases and Software', in. T. Feigenbaum and M. Merritt (eds.). Distributed Computing and Cryptography, Vol. 2. pp. 161-172.
-
(1991)
Distributed Computing and Cryptography
, vol.2
, pp. 161-172
-
-
Feigenbaum, J.1
Liberman, M.2
Wright, R.3
-
13
-
-
27844589079
-
Cryptographic protection of membership lists
-
Feigenbaum, J., E. Grosse, and J. Reeds: 1992, "Cryptographic Protection of Membership Lists', Newsletter of the International Association for Cryptologic Research 9(1). 16-20.
-
(1992)
Newsletter of the International Association for Cryptologic Research
, vol.9
, Issue.1
, pp. 16-20
-
-
Feigenbaum, J.1
Grosse, E.2
Reeds, J.3
-
14
-
-
35048820609
-
Efficient private matching and set intersection
-
C. Cachin and J. Camenisch (eds.). Springer Verlag, Berlin
-
Freedman. M. J., K. Nissim. and B. Pinkas: 2004. "Efficient Private Matching and Set Intersection', in C. Cachin and J. Camenisch (eds.). Advances in Cryptology EUROCRYPT 2004, Lecture Notes in Computer Science. Vol. 2037, Springer Verlag, Berlin, pp. 1-19.
-
(2004)
Advances in Cryptology EUROCRYPT 2004, Lecture Notes in Computer Science
, vol.2037
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
15
-
-
23944519585
-
Zero-knowledge twenty years after its invention
-
Department of Computer Science, Weizmann Institute of Science
-
Goldreich, O.: 2002. "Zero-knowledge Twenty Years after its Invention', Technical report, Department of Computer Science, Weizmann Institute of Science.
-
(2002)
Technical Report
-
-
Goldreich, O.1
-
16
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proofs
-
Goldreich. O., S. Micali. and A. Wigderson: 1991. 'Proofs that Yield Nothing But their Validity or All Languages in NP have Zero-Knowledge Proofs'. JACM 38. 691-729.
-
(1991)
JACM
, vol.38
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
17
-
-
0021941417
-
The knowledge complexity of interactive proof-systems
-
Providence, RI
-
Goldwasser. S., S. Micali, and C. Rackoff: 1985. 'The Knowledge Complexity of Interactive Proof-systems', in Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, Providence, RI, pp. 291-304.
-
(1985)
Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
18
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
D. Cooper and T. Lunt (eds.). IEEE Computer Society Press, Los Angeles
-
Gong. L., R. Needham. and R. Yahalom: 1990. 'Reasoning About Belief in Cryptographic Protocols', in D. Cooper and T. Lunt (eds.). Proceedings 1990 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Angeles, pp. 234-248.
-
(1990)
Proceedings 1990 IEEE Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
19
-
-
84955606093
-
Proving without knowing: On oblivious. Agnostic and blindfolded provers
-
N. Koblitz (ed.). Springer Verlag. Berlin
-
Jakobsson, M. and M. Yung: 1996, 'Proving without Knowing: On Oblivious. Agnostic and Blindfolded Provers', in N. Koblitz (ed.), Advances in Cryptology: Crypto '96 Proceedings, Lecture Notes in Computer Science, Vol. 1109. Springer Verlag. Berlin, pp. 186-200.
-
(1996)
Advances in Cryptology: Crypto '96 Proceedings, Lecture Notes in Computer Science
, vol.1109
, pp. 186-200
-
-
Jakobsson, M.1
Yung, M.2
-
20
-
-
0342658605
-
Breaking and fixing the needham-schroeder public-key protocol using FDR
-
Springer-Verlag, Berlin
-
Lowe, G: 1996. "Breaking and Fixing the Needham-Schroeder Public-key Protocol Using FDR', in Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Vol. 1055, Springer-Verlag, Berlin, pp. 147-166.
-
(1996)
Tools and Algorithms for the Construction and Analysis of Systems (TACAS)
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
22
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
ACM Press. New York
-
Naor, M. and M. Yung: 1989, 'Universal One-way Hash Functions and their Cryptographic Applications', in Proceedings of the Twenty First Annual ACM Symposium on Theorv of Computing, May 15-17 1989: Seattle, WA, USA, ACM Press. New York, pp." 33-43.
-
(1989)
Proceedings of the Twenty First Annual ACM Symposium on Theorv of Computing, May 15-17 1989: Seattle, WA, USA
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
23
-
-
0005010894
-
Proposed federal information processing standard for secure hash standard
-
National Institute of Standards and Technology: 1992. 'Proposed Federal Information Processing Standard for Secure Hash Standard'. Federal Register 57(21). 3747-3749.
-
(1992)
Federal Register
, vol.57
, Issue.21
, pp. 3747-3749
-
-
-
24
-
-
0025405980
-
A critique of the burrows. Abadi and needham logic
-
Nessett, D. M.: 1990, 'A Critique of the Burrows. Abadi and Needham Logic'. ACM SIGOPS Operating Systems Review 24(2), 35-38.
-
(1990)
ACM SIGOPS Operating Systems Review
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.M.1
-
25
-
-
51549120471
-
MDx-MAC and building fast MACs from hash functions
-
D. Coppersmith (ed.), Springer Verlag. Berlin
-
Preneel, B. and P. van Oorschot: 1995. "MDx-MAC and Building Fast MACs from Hash Functions', in D. Coppersmith (ed.), Advances in Cryptology: Crypto '95 Proceedings, Lecture Notes in Computer Science. Vol. 963. Springer Verlag. Berlin, pp. 1-14.
-
(1995)
Advances in Cryptology: Crypto '95 Proceedings, Lecture Notes in Computer Science
, vol.963
, pp. 1-14
-
-
Preneel, B.1
Van Oorschot, P.2
-
27
-
-
27844464597
-
New protocols for proving knowledge of arbitrary secrets while not giving them away
-
P. McBurney, W van der Hoek. and M. Wooldridge (eds.). University of Liverpool, Liverpool
-
Teepe, W.: 2004a, 'New Protocols for Proving Knowledge of Arbitrary Secrets while not Giving them away", in P. McBurney, W van der Hoek. and M. Wooldridge (eds.). Proceedings of the First Knowledge and Games Workshop. University of Liverpool, Liverpool, pp. 99-116.
-
(2004)
Proceedings of the First Knowledge and Games Workshop
, pp. 99-116
-
-
Teepe, W.1
-
29
-
-
0026973508
-
Message authentication with one-way hash functions
-
IEEE Computer Society Press. Los Angeles
-
Tsudik, G.: 1992. "Message Authentication with One-Way Hash Functions", in Proceedings of IEEE INFOCOM 1992. IEEE Computer Society Press. Los Angeles, pp. 2055-2059.
-
(1992)
Proceedings of IEEE INFOCOM 1992
, pp. 2055-2059
-
-
Tsudik, G.1
-
30
-
-
1142270378
-
The russian cards problem
-
van Ditmarsch. H.: 2003, 'The Russian Cards Problem". Studio Logica 75, 31-62.
-
(2003)
Studio Logica
, vol.75
, pp. 31-62
-
-
Van Ditmarsch, H.1
-
31
-
-
35248875140
-
Equivalence between semantic security and indistinguishability against chosen ciphertext attacks
-
Y Desmedt (ed.). Springer-Verlag, Berlin
-
Watanabe, Y., J. Shikata. and H. Imai: 2003. 'Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks', in Y Desmedt (ed.). Proceedings of International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2003), Lecture Notes in Computer Science. Vol. 2567. Springer-Verlag, Berlin, pp. 71-84.
-
(2003)
Proceedings of International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2003), Lecture Notes in Computer Science
, vol.2567
, pp. 71-84
-
-
Watanabe, Y.1
Shikata, J.2
Imai, H.3
|