-
1
-
-
84916256739
-
On Generating Solved Instances of Computational Problems
-
Springer Verlag LNCS
-
M. Abadi, E. Allender, A. Broder, J. Feigenbaum and L. Hemachandra: On Generating Solved Instances of Computational Problems, Proceedings of Crypto’88, Springer Verlag LNCS, vol. 403, pp. 297-310.
-
Proceedings of Crypto’88
, vol.403
, pp. 297-310
-
-
Abadi, M.1
Allender, E.2
Broder, A.3
Feigenbaum, J.4
Hemachandra, L.5
-
2
-
-
0023995534
-
Arthur-Merlin Games: A Randomized Proof System and a Hierarchy of Complexity Classes
-
L. Babai and S. Moran: Arthur-Merlin Games: A Randomized Proof System and a Hierarchy of Complexity Classes, JCSS, vol. 36, pp. 254-276, 1988.
-
(1988)
JCSS
, vol.36
, pp. 254-276
-
-
Babai, L.1
Moran, S.2
-
3
-
-
84983104598
-
On Defining Proofs of Knowledge
-
Springer Verlag LNCS
-
M. Bellare and O. Goldreich: On Defining Proofs of Knowledge, Proceedings of Crypto’92, Springer Verlag LNCS, vol. 740, pp. 390-420.
-
Proceedings of Crypto’92
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
4
-
-
0013402235
-
Secure. Implementation of Identification Systems
-
S. Bengio, G. Brassard, Y. Desmedt, C. Goutier and J.J. Quisquater: Secure. Implementation of Identification Systems, Journal of Cryptology, 1991 (4): 175-183.
-
(1991)
Journal of Cryptology
, Issue.4
, pp. 175-183
-
-
Bengio, S.1
Brassard, G.2
Desmedt, Y.3
Goutier, C.4
Quisquater, J.J.5
-
6
-
-
84921068967
-
Secure Signature Schemes based on Interactive Protocols
-
Springer Verlag LNCS
-
R. Cramer and I. Damgard: Secure Signature Schemes based on Interactive Protocols, Proceedings of Crypto’95, Springer Verlag LNCS, vol. 963, pp. 297-310.
-
Proceedings of Crypto’95
, vol.963
, pp. 297-310
-
-
Cramer, R.1
Damgard, I.2
-
7
-
-
85016672373
-
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
-
Springer verlag LNCS
-
R. Cramer, I. Damgard and B. Schoenmakers: Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols, Proceedings of Crypto’94, Springer verlag LNCS, vol. 839, pp. 174-187.
-
Proceedings of Crypto’94
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgard, I.2
Schoenmakers, B.3
-
9
-
-
84990731886
-
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
-
Springer Verlag LNCS
-
A. Fiat and A. Shamir: How to Prove Yourself: Practical Solutions to Identification and Signature Problems, Proceedings of Crypto’86, Springer Verlag LNCS, vol. 263, pp. 186-194
-
Proceedings of Crypto’86
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
10
-
-
0024984004
-
Witness Indistinguishable and Witness Hiding Protocols
-
U. Feige, A. Shamir: Witness Indistinguishable and Witness Hiding Protocols, Proceedings of STOC’90, pp. 416-426.
-
Proceedings of STOC’90
, pp. 416-426
-
-
Feige, U.1
Shamir, A.2
-
12
-
-
84976826800
-
Zero-Knowledge Proofs of Knowledge in Two Rounds
-
Springer Verlag LNCS
-
U. Feige and A. Shamir: Zero-Knowledge Proofs of Knowledge in Two Rounds, Proceedings of Crypto’89, Springer Verlag LNCS, vol. 435, pp. 526-544.
-
Proceedings of Crypto’89
, vol.435
, pp. 526-544
-
-
Feige, U.1
Shamir, A.2
-
13
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof Systems
-
S. Goldwasser, S. Micali and C. Rackoff: The Knowledge Complexity of Interactive Proof Systems, SIAM J. Computing, Vol. 18, pp. 186-208, 1989.
-
(1989)
SIAM J. Computing
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
14
-
-
84957389244
-
-
preprint, October
-
Efficient Identification Schemes Secure against Impersonation and Man-in-the-Middle Attacks, preprint, October 1995.
-
(1995)
-
-
-
15
-
-
84959165880
-
A Practical Zero-Knowledge Protocol fitted to Security Microprocessor Minimizing both Transmission and Memory
-
Springer Verlag LNCS
-
L. Guillou, J.J. Quisquater: A Practical Zero-Knowledge Protocol fitted to Security Microprocessor Minimizing both Transmission and Memory, Proceedings of Eurocrypt’88, Springer Verlag LNCS, vol. 330, pp. 123-128.
-
Proceedings of Eurocrypt’88
, vol.330
, pp. 123-128
-
-
Guillou, L.1
Quisquater, J.J.2
-
16
-
-
0002914851
-
Designated Verifier Proofs and their Applications
-
Springer Verlag LNCS
-
M. Jacobson, R. Impagliazzo and K. Sako: Designated Verifier Proofs and their Applications, Proc. of Eurocrypt’96, Springer Verlag LNCS, vol. 1070, pp. 143-154.
-
Proc. of Eurocrypt’96
, vol.1070
, pp. 143-154
-
-
Jacobson, M.1
Impagliazzo, R.2
Sako, K.3
-
17
-
-
84875762817
-
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
-
Springer Verlag LNCS
-
T. Okamoto: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, Proceedings of Crypto’92, Springer Verlag LNCS, vol. 740, pp. 31-53.
-
Proceedings of Crypto’92
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
18
-
-
12344258539
-
Efficient Signature Generation by Smart Cards
-
C. P. Schnorr: Efficient Signature Generation by Smart Cards, Journal of Cryptology, 4 (3): 161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
|