-
1
-
-
84957069963
-
Robust distributed multiplication without interaction
-
M. Wiener, editor, Advances in Cryptology -CRYPTO '99, Springer-Verlag
-
M. Abe. Robust distributed multiplication without interaction. In M. Wiener, editor, Advances in Cryptology -CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 130-147. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 130-147
-
-
Abe, M.1
-
2
-
-
84958748475
-
Non-interactive distributed-verifier proofs and proving relations among commitments
-
Y. Zheng, editor, Advances in Cryptology - ASIACRYPT '02, Springer-Verlag
-
M. Abe, R. Cramer, and S. Fehr. Non-interactive distributed-verifier proofs and proving relations among commitments. In Y. Zheng, editor, Advances in Cryptology - ASIACRYPT '02, volume 2501 of Lecture Notes in Computer Science, pages 206-223. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 206-223
-
-
Abe, M.1
Cramer, R.2
Fehr, S.3
-
6
-
-
0029723583
-
Adaptively secure multi-party computation
-
R. Canetti, U. Feige, O. Goldreich, and M. Naor. Adaptively secure multi-party computation. In Proceedings of the 28th annual ACM Symposium on the Theory of Computing, pages 639-648, 1996.
-
(1996)
Proceedings of the 28th Annual ACM Symposium on the Theory of Computing
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
7
-
-
84957083549
-
Adaptive security for threshold cryptosystems
-
M. Wiener, editor, Advances in Cryptology CRYPTO '99, Springer-Verlag
-
R. Canetti, R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Adaptive security for threshold cryptosystems. In M. Wiener, editor, Advances in Cryptology CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 98-115. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 98-115
-
-
Canetti, R.1
Gennaro, R.2
Jarecki, S.3
Krawczyk, H.4
Rabin, T.5
-
9
-
-
84974602942
-
Improved non-committing encryption schemes based on a general complexity assumption
-
M. Bellare, editor, Advances in Cryptology CRYPTO 2000, Springer-Verlag
-
I. Damgård and J. Nielsen. Improved non-committing encryption schemes based on a general complexity assumption. In M. Bellare, editor, Advances in Cryptology CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 432-450. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 432-450
-
-
Damgård, I.1
Nielsen, J.2
-
11
-
-
84958045007
-
Adaptively-secure distributed publickey systems
-
J. Nesetril, editor, European Symposium on Algorithms (ESA '99), Springer-Verlag
-
Y. Frankel, P. D. MacKenzie, and M. Yung. Adaptively-secure distributed publickey systems. In J. Nesetril, editor, European Symposium on Algorithms (ESA '99), volume 1643 of Lecture Notes in Computer Science, pages 4-27. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1643
, pp. 4-27
-
-
Frankel, Y.1
MacKenzie, P.D.2
Yung, M.3
-
12
-
-
49049089688
-
Secure distributed key generation for discrete-log based cryptosystems
-
J. Stern, editor, Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 295-310. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT '99
, vol.1592
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
13
-
-
84948968753
-
Adaptively secure threshold cryptography: Introducing concurrency, removing erasures (extended abstract)
-
B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, Springer-Verlag
-
S. Jarecki and A. Lysyanskaya. Adaptively secure threshold cryptography: Introducing concurrency, removing erasures (extended abstract). In B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 221-242. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 221-242
-
-
Jarecki, S.1
Lysyanskaya, A.2
-
14
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
D. W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, Springer-Verlag
-
T. P. Pedersen. A threshold cryptosystem without a trusted party. In D. W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, volume 547 of Lecture Notes in Computer Science, pages 522-526. Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 522-526
-
-
Pedersen, T.P.1
-
15
-
-
12344258539
-
Efficient signature generation for smart cards
-
C. P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):239-252, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 239-252
-
-
Schnorr, C.P.1
-
16
-
-
35048873776
-
A universally composable mix-net
-
Proceedings of the First Theory of Cryptography Conference (TCC'04), Springer-Verlag
-
D. Wikström. A universally composable mix-net. In Proceedings of the First Theory of Cryptography Conference (TCC'04), volume 2951 of Lecture Notes in Computer Science, pages 315-335. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 315-335
-
-
Wikström, D.1
|