-
2
-
-
33746365751
-
Secure multi-party protocols and zero-knowledge proof systems tolerating a fault minority
-
D. Beaver. Secure Multi-Party Protocols and Zero-Knowledge Proof Systems Tolerating a Fault Minority. Journal of Cryptology, 4(2):75-122, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 75-122
-
-
Beaver, D.1
-
4
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Springer-Verlag (LNCS 1807), Berlin
-
M. Bellare, D. Pointcheval and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In EUROCRYPT '00, pages 139-155. Springer-Verlag (LNCS 1807), Berlin, 2000.
-
(2000)
EUROCRYPT '00
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
84945119254
-
Entity authentication and key distribution
-
Springer-Verlag (LNCS 773), Berlin
-
M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In CRYPTO '93, pages 232-249. Springer-Verlag (LNCS 773), Berlin, 1994.
-
(1994)
CRYPTO '93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
0006578697
-
Certifying permutations: Non-interactive zero-knowledge based on any trapdoor permutation
-
M. Bellare and M. Yung. Certifying Permutations: Non-Interactive Zero-Knowledge Based on Any Trapdoor Permutation. Journal of Cryptology, 9(3):149-166, 1996.
-
(1996)
Journal of Cryptology
, vol.9
, Issue.3
, pp. 149-166
-
-
Bellare, M.1
Yung, M.2
-
10
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
S.M. Bellovin and M. Merritt. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise. In Proceedings of the 1st ACM Conference on Computer and Communication Security, pages 244-250, 1993.
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communication Security
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
12
-
-
84949995981
-
An efficient probabilistic public-key encryption scheme which hides all partial information
-
Springer-Verlag (LNCS 196), Berlin
-
M. Blum and S. Goldwasser. An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information. In CRYPTO '84, pages 289-302. Springer-Verlag (LNCS 196), Berlin, 1985.
-
(1985)
CRYPTO '84
, pp. 289-302
-
-
Blum, M.1
Goldwasser, S.2
-
13
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM Journal of Computation, 13(4):850-864, 1984.
-
(1984)
SIAM Journal of Computation
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
15
-
-
84937550984
-
Provably secure password-authenticated key exchange using diffie-hellman
-
Springer-Verlag (LNCS 1807), Berlin
-
V. Boyko, P. MacKenzie and S. Patel. Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman. In EUROCRYPT '00, pages 156-171. Springer-Verlag (LNCS 1807), Berlin, 2000.
-
(2000)
EUROCRYPT '00
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
16
-
-
0000731055
-
Security and composition of multi-party cryptographic protocols
-
R. Canetti. Security and Composition of Multi-Party Cryptographic Protocols. Journal of Cryptology, 13(1):143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
18
-
-
0031619016
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi. The Random Oracle Methodology, Revisited. In Proceedings of the 30th ACM Symposium on the Theory of Computing, pages 209-218, 1998.
-
(1998)
Proceedings of the 30th ACM Symposium on the Theory of Computing
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
19
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Springer-Verlag (LNCS 2045), Berlin
-
R. Canetti and H. Krawczyk. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In EUROCRYPT '01, pages 453-474. Springer-Verlag (LNCS 2045), Berlin, 2001.
-
(2001)
EUROCRYPT '01
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
22
-
-
0343337504
-
Non-malleable cryptography
-
D. Dolev, C. Dwork, and M. Naor. Non-Malleable Cryptography. SIAM Journal on Computing, 30(2):391-437, 2000.
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
24
-
-
0034497243
-
The relationship between public-key encryption and oblivious transfer
-
Y. Gertner, S. Kannan, T. Malkin, O. Reingold and M. Viswanathan. The Relationship between Public-Key Encryption and Oblivious Transfer. In Proceedings of the 41st IEEE Symposium on the Foundations of Computer Science, pages 325-335, 2000.
-
(2000)
Proceedings of the 41st IEEE Symposium on the Foundations of Computer Science
, pp. 325-335
-
-
Gertner, Y.1
Kannan, S.2
Malkin, T.3
Reingold, O.4
Viswanathan, M.5
-
27
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali. How to Construct Random Functions. Journal of the ACM, 33(4):792-807, 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
28
-
-
0000108216
-
How to construct constant-round zero-knowledge proof systems for NP
-
O. Goldreich and A. Kahan. How to Construct Constant-Round Zero-Knowledge Proof Systems for NP. Journal of Cryptology, 9(3):167-190, 1996.
-
(1996)
Journal of Cryptology
, vol.9
, Issue.3
, pp. 167-190
-
-
Goldreich, O.1
Kahan, A.2
-
30
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
For details see Chapter 7 of [26]
-
O. Goldreich, S. Micali and A. Wigderson. How to Play Any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In Proceedings of the 19th ACM Symposium on the Theory of Computing, pages 218-229, 1987. For details see Chapter 7 of [26].
-
(1987)
Proceedings of the 19th ACM Symposium on the Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
31
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
O. Goldreich, S. Micali and A. Wigderson. Proofs that Yield Nothing but Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems. Journal of the ACM, 38(1):691-729, 1991.
-
(1991)
Journal of the ACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
33
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali and C. Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM Journal on Computing, 18(1):186-208, 1989.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
36
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D.P. Jablon. Strong Password-Only Authenticated Key Exchange. SIGCOMM Computer Communications Review, 26(5):5-26, 1996.
-
(1996)
SIGCOMM Computer Communications Review
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.P.1
-
37
-
-
84945132563
-
Practical password-authenticated key exchange provably secure under standard assumptions
-
Springer-Verlag (LNCS 2045), Berlin
-
J. Katz, R. Ostrovsky and M. Yung. Practical Password-Authenticated Key Exchange Provably Secure under Standard Assumptions. In EUROCRYPT '01, pages 475-494. Springer-Verlag (LNCS 2045), Berlin, 2001.
-
(2001)
EUROCRYPT '01
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
40
-
-
35048833033
-
Parallel coin-tossing and constant-round secure two-party computation
-
Springer-Verlag (LNCS 2139), Berlin
-
Y. Lindell. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. In CRYPTO '01, pages 171-189. Springer-Verlag (LNCS 2139), Berlin, 2001.
-
(2001)
CRYPTO '01
, pp. 171-189
-
-
Lindell, Y.1
-
41
-
-
84957025686
-
Open key exchange: How to defeat dictionary attacks Without encrypting public keys
-
Springer-Verlag (LNCS 1361), Berlin
-
S. Lucks. Open Key Exchange: How to Defeat Dictionary Attacks without Encrypting Public Keys. In Security Protocols, 5th International Workshop, pages 79-90. Springer-Verlag (LNCS 1361), Berlin, 1998.
-
(1998)
Security Protocols, 5th International Workshop
, pp. 79-90
-
-
Lucks, S.1
-
43
-
-
84974655726
-
Secure Computation. Unpublished manuscript, 1992
-
Preliminary version, Springer-Verlag (LNCS 576), Berlin
-
S. Micali and P. Rogaway. Secure Computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO '91, pages 392-404, Springer-Verlag (LNCS 576), Berlin, 1991.
-
(1991)
CRYPTO '91
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
44
-
-
0141544069
-
Zero-knowledge arguments for NP can be based on general assumptions
-
M. Naor, R. Ostrovsky, R. Venkatesan and M. Yung. Zero-Knowledge Arguments for NP Can Be Based on General Assumptions. Journal of Cryptology, 11(2):87-108, 1998.
-
(1998)
Journal of Cryptology
, vol.11
, Issue.2
, pp. 87-108
-
-
Naor, M.1
Ostrovsky, R.2
Venkatesan, R.3
Yung, M.4
-
46
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham and M.D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
48
-
-
84957621865
-
On the concurrent composition of zero-knowledge proofs
-
Springer-Verlag (LNCS 1592), Berlin
-
R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. In EUROCRYPT '99, pages 415-431. Springer-Verlag (LNCS 1592), Berlin, 1999.
-
(1999)
EUROCRYPT '99
, pp. 415-431
-
-
Richardson, R.1
Kilian, J.2
-
49
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. Rivest, A. Shamir and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
50
-
-
0004023090
-
On formal models for secure key exchange
-
Report 1999/012
-
V. Shoup. On Formal Models for Secure Key Exchange. Cryptology ePrint Archive, Report 1999/012, http://eprint.iacr.org/.
-
Cryptology ePrint Archive
-
-
Shoup, V.1
|