-
1
-
-
63449118333
-
Flaws in some robust optimistic mix-nets
-
ACISP'03, Springer-Verlag
-
M. Abe and H. Imai. Flaws in some robust optimistic mix-nets. In ACISP'03, volume 2727 of LNCS, pages 39 - 50. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2727
, pp. 39-50
-
-
Abe, M.1
Imai, H.2
-
2
-
-
84957613967
-
Security amplification by composition: The case of doubly-iterated, ideal ciphers
-
Crypto'98, Springer-Verlag
-
B. Aiello, M. Bellare, G. Di Crescenzo, and R. Venkatesan. Security amplification by composition: the case of doubly-iterated, ideal ciphers. In Crypto'98, volume 1462 of LNCS, pages 390-407. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 390-407
-
-
Aiello, B.1
Bellare, M.2
Di Crescenzo, G.3
Venkatesan, R.4
-
3
-
-
84947237328
-
On the security of joint signature and encryption
-
Eurocrypt'02, Springer-Verlag
-
J.H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In Eurocrypt'02, volume 2332 of LNCS, pages 83-107, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
4
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Crypto'98, Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogway. Relations among notions of security for public-key encryption schemes. In Crypto'98, volume 1462 of LNCS. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1462
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogway, P.4
-
5
-
-
0035163054
-
Composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Composable security: A new paradigm for cryptographic protocols. In 42nd FOCS, pages 136-145, 2001.
-
(2001)
42nd FOCS
, pp. 136-145
-
-
Canetti, R.1
-
6
-
-
24944571996
-
Relaxing chosen-ciphertext security
-
R. Canetti, H. Krawczyk, and J. Nielsen. Relaxing chosen-ciphertext security. In Crypto'03. Full version available: http://eprint.iacr.org/2003/174/ , 2003.
-
(2003)
Crypto'03
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.3
-
7
-
-
0019532104
-
Untraceable electronic mail, return address, and digitalpseudonyms
-
D. Chaum. Untraceable electronic mail, return address, and digitalpseudonyms. Communication of the ACM, 24:84-88, 1981.
-
(1981)
Communication of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
8
-
-
85023809951
-
Threshold cryptosystems
-
Crypto'89, Springer-Verlag
-
Y. Desmedt and Y. Frankel. Threshold cryptosystems. In Crypto'89, volume 435 of LNCS, pages 307-315. Springer-Verlag, 1989.
-
(1989)
LNCS
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
9
-
-
0017501281
-
Exhaustive cryptananlysis of NBS data encryption standard
-
June
-
W. Diffie and M.E. Hellman. Exhaustive cryptananlysis of NBS data encryption standard. IEEE Computer Magazine, 10(6):74-84, June 1977.
-
(1977)
IEEE Computer Magazine
, vol.10
, Issue.6
, pp. 74-84
-
-
Diffie, W.1
Hellman, M.E.2
-
11
-
-
84947254092
-
Key-insulated public key cryptosystems
-
Eurocrypt'02, Springer-Verlag
-
Y. Dodis, J. Katz, S. Xu, and M. Yung. Key-insulated public key cryptosystems. In Eurocrypt'02, volume 2332 of LNCS, pages 65-82. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 65-82
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
12
-
-
85028450627
-
Non-malleable cryptography
-
ACM
-
D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. In 23rd STOC, pages 542-552. ACM, 1991.
-
(1991)
23rd STOC
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
14
-
-
84968502759
-
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
-
G. Frey and H.G. Rück. A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Mathematics of Computation, 62(206):865-874, 1994.
-
(1994)
Mathematics of Computation
, vol.62
, Issue.206
, pp. 865-874
-
-
Frey, G.1
Rück, H.G.2
-
18
-
-
84958742387
-
Optimistic mixing for exit-polls
-
Springer-Verlag
-
P. Golle, S. Zhong, D. Boneh, M. Jakobsson, and A. Juels. Optimistic mixing for exit-polls. In Asiacrypt'02, volume 2501, pages 451-465. Springer-Verlag, 2002.
-
(2002)
Asiacrypt'02
, vol.2501
, pp. 451-465
-
-
Golle, P.1
Zhong, S.2
Boneh, D.3
Jakobsson, M.4
Juels, A.5
-
19
-
-
84957709438
-
A practical mix
-
Eurocrypt'98, Springer-Verlag
-
M. Jakobsson. A practical mix. In Eurocrypt'98, volume 1403 of LNCS, pages 448-461. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1403
, pp. 448-461
-
-
Jakobsson, M.1
-
21
-
-
84957057937
-
Coding constructions for blacklisting problems
-
Crypto'99, Springer-Verlag
-
R. Kumar, S. Rajagopalan, and A. Sahai. Coding constructions for blacklisting problems. In Crypto'99, volume 1666 of LNCS, pages 609-623. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 609-623
-
-
Kumar, R.1
Rajagopalan, S.2
Sahai, A.3
-
24
-
-
0019587141
-
On the security of multiple encryption
-
R. Merkle and M. Hellman. On the security of multiple encryption. Communications of the ACM, 24(7):465-467, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.7
, pp. 465-467
-
-
Merkle, R.1
Hellman, M.2
-
25
-
-
24944583413
-
-
Latest version: Feb. 2003
-
NESSIE. NESSIE Portfolio of recommended cryptographic primitives (Latest version: Feb. 2003). Available at: https://www.cosic.esat.kuleuven.ac.be/nessie/ deliverables/decision-final.pdf.
-
NESSIE Portfolio of Recommended Cryptographic Primitives
-
-
-
26
-
-
84974554584
-
Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Crypto'91, Springer-Verlag
-
C. Rackoff and D. Simon. Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack. In Crypto'91, volume 576 of LNCS, pages 433-444. Springer-Verlag, 1991.
-
(1991)
LNCS
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
-
27
-
-
0343623059
-
Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves
-
T. Satoh and K. Araki. Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves. Commentarii Mathematici Universitatis Sancti Pauli, (47):81-92, 1998.
-
(1998)
Commentarii Mathematici Universitatis Sancti Pauli
, Issue.47
, pp. 81-92
-
-
Satoh, T.1
Araki, K.2
-
28
-
-
0032352723
-
Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p
-
I. Semaev. Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p. Mathematics of Computation, (67):353-356, 1998.
-
(1998)
Mathematics of Computation
, Issue.67
, pp. 353-356
-
-
Semaev, I.1
-
29
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon. Communication theory of secrecy systems. In Bell System Technical Journal, volume 28, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
-
-
Shannon, C.1
-
30
-
-
84880904783
-
OAEP reconsidered
-
Crypto'01
-
V. Shoup. OAEP reconsidered. In Crypto'01, volume 2139 of LNCS, pages 239-259, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 239-259
-
-
Shoup, V.1
-
32
-
-
1842599265
-
Securing threshold cryptosystems against chosen ciphertext attack
-
V. Shoup and R. Gennaro. Securing threshold cryptosystems against chosen ciphertext attack. Journal of Cryptology, 15(2):75-96, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 75-96
-
-
Shoup, V.1
Gennaro, R.2
-
33
-
-
0003539458
-
The discrete logarithm problems on elliptic curves of trace one
-
N. Smart. The discrete logarithm problems on elliptic curves of trace one. Journal of Cryptology, 12:193-196, 1999.
-
(1999)
Journal of Cryptology
, vol.12
, pp. 193-196
-
-
Smart, N.1
-
34
-
-
35248875140
-
Equivalence between semantic security and indistinguishability against chosen ciphertext attacks
-
PKC 2003
-
Y. Watanabe, J. Shikata, and H. Imai. Equivalence between semantic security and indistinguishability against chosen ciphertext attacks. In PKC 2003, volume 2567 of LNCS, pages 71-84, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 71-84
-
-
Watanabe, Y.1
Shikata, J.2
Imai, H.3
-
36
-
-
35048880573
-
On the security of multi-layered encryption or CCA-security+CCA-security= CCA-security?
-
January
-
R. Zhang, G. Hanaoka, J. Shikata, and H. Imai. On the security of multi-layered encryption or CCA-security+CCA-security=CCA-security? In SCIS'03, January, 2003.
-
(2003)
SCIS'03
-
-
Zhang, R.1
Hanaoka, G.2
Shikata, J.3
Imai, H.4
|