-
1
-
-
84957069963
-
Robust distributed multiplication without interaction
-
LNCS 1666, Springer-Verlag
-
M. Abe. Robust distributed multiplication without interaction. In Advances in Cryptology - CRYPTO'99, LNCS 1666, Springer-Verlag, pp. 130-147 (1999).
-
(1999)
Advances in Cryptology - CRYPTO'99
, pp. 130-147
-
-
Abe, M.1
-
2
-
-
84958748475
-
Non-interactive distributed-verifier proofs and proving relations among commitments
-
LNCS 2501, Springer-Verlag
-
M. Abe, R. Cramer and S. Fehr. Non-interactive distributed-verifier proofs and proving relations among commitments. In Advances in Cryptology - ASIACRYPT 2002, LNCS 2501, Springer-Verlag, pp. 206-223 (2002).
-
(2002)
Advances in Cryptology - ASIACRYPT 2002
, pp. 206-223
-
-
Abe, M.1
Cramer, R.2
Fehr, S.3
-
3
-
-
33646833311
-
Adaptively secure Feldman VSS and applications to universally-composable threshold cryptography
-
LNCS 3152, Springer-Verlag
-
M. Abe and S. Fehr. Adaptively secure Feldman VSS and applications to universally-composable threshold cryptography. In Advances in Cryptology CRYPTO 2004, LNCS 3152, Springer-Verlag, pp. 317-334 (2004).
-
(2004)
Advances in Cryptology CRYPTO 2004
, pp. 317-334
-
-
Abe, M.1
Fehr, S.2
-
5
-
-
85062838317
-
Safeguarding cryptographic keys
-
G.R. Blakley. Safeguarding cryptographic keys. In Proc. of AFIPS'79, pp. 313-317 (1979).
-
(1979)
Proc. of AFIPS'79
, pp. 313-317
-
-
Blakley, G.R.1
-
6
-
-
35048848152
-
Short signatures without random oracles
-
LNCS 3027, Springer-Verlag
-
D. Boneh and X. Boyen. Short signatures without random oracles. In Advances in Cryptology - EUROCRYPT 2004, LNCS 3027, Springer-Verlag, pp. 56-73 (2004).
-
(2004)
Advances in Cryptology - EUROCRYPT 2004
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
8
-
-
84957083549
-
Adaptive security for threshold cryptosystems
-
LNCS 1666, Springer-Verlag
-
R. Canetti, R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin. Adaptive security for threshold cryptosystems. In Advances in Cryptology - CRYPTO'99, LNCS 1666, Springer-Verlag, pp. 98-115 (1999).
-
(1999)
Advances in Cryptology - CRYPTO'99
, pp. 98-115
-
-
Canetti, R.1
Gennaro, R.2
Jarecki, S.3
Krawczyk, H.4
Rabin, T.5
-
11
-
-
85024261619
-
Signature schemes based on the strong RSA assumption
-
R. Cramer and V. Shoup. Signature schemes based on the strong RSA assumption. ACM TISSEC, Vol. 3, No. 3, pp. 161-185 (2000).
-
(2000)
ACM TISSEC
, vol.3
, Issue.3
, pp. 161-185
-
-
Cramer, R.1
Shoup, V.2
-
12
-
-
84957661041
-
Secure hash-and-sign signatures without the random oracle
-
LNCS 1592, Springer-Verlag
-
R. Gennaro, S. Halevi and T. Rabin. Secure hash-and-sign signatures without the random oracle. In Advances in Cryptology - EUROCRYPT'99, LNCS 1592, Springer-Verlag, pp. 123-139 (1999).
-
(1999)
Advances in Cryptology - EUROCRYPT'99
, pp. 123-139
-
-
Gennaro, R.1
Halevi, S.2
Rabin, T.3
-
13
-
-
49049089688
-
Secure distributed key generation for discrete-log based cryptosystems
-
LNCS 1592, Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. In Advances in Cryptology - EUROCRYPT'99, LNCS 1592, Springer-Verlag, pp. 295-310 (1999).
-
(1999)
Advances in Cryptology - EUROCRYPT'99
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
14
-
-
0035835293
-
Robust threshold DSS signatures
-
R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin. Robust threshold DSS signatures. Information and Computation, Vol. 164, No. 1, pp. 54-84 (2001).
-
(2001)
Information and Computation
, vol.164
, Issue.1
, pp. 54-84
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
15
-
-
0024611659
-
The knowledge complexity of interactive proof-systems
-
S. Goldwasser, S. Micali and C. Rackoff. The knowledge complexity of interactive proof-systems. SIAM J. Computing, Vol. 18, No. 1, pp. 186-208 (1989).
-
(1989)
SIAM J. Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
16
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, Vol. 17, No. 2, pp. 281-308 (1988).
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
17
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
LNCS 547, Springer-Verlag
-
T. Pedersen. A threshold cryptosystem without a trusted party. In Advances in Cryptology - EUROCRYPT'91, LNCS 547, Springer-Verlag, pp. 522-526 (1991).
-
(1991)
Advances in Cryptology - EUROCRYPT'91
, pp. 522-526
-
-
Pedersen, T.1
-
18
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
LNCS 576, Springer-Verlag
-
T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology - CRYPTO'91, LNCS 576, Springer-Verlag, pp. 129-140 (1991).
-
(1991)
Advances in Cryptology - CRYPTO'91
, pp. 129-140
-
-
Pedersen, T.1
-
20
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, Vol. 22, No. 11, pp. 612-613 (1979).
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
21
-
-
33646843187
-
-
Error correction of algebraic block codes. U. S. Patent 4 633 470
-
L.R. Welch and E.R. Berlekamp. Error correction of algebraic block codes. U. S. Patent 4 633 470 (1983).
-
(1983)
-
-
Welch, L.R.1
Berlekamp, E.R.2
|