-
1
-
-
5744224341
-
Fast batch verification for modular exponentiation and digital signatures
-
BELLARE, M., GARAY, J., AND RABIN, T. 1998. Fast batch verification for modular exponentiation and digital signatures. In Proceedings of the Eurocrypt Conference, vol. 1403, 191-204.
-
(1998)
Proceedings of the Eurocrypt Conference
, vol.1403
, pp. 191-204
-
-
Bellare, M.1
Garay, J.2
Rabin, T.3
-
2
-
-
84937408891
-
Gq and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks
-
M. Yung, ed. Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany
-
BELLARE, M. AND PALACIO, A. 2002. Gq and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In Advances in Cryptology - CRYPTO, M. Yung, ed. Lecture Notes in Computer Science, vol. 2442, Springer-Verlag, Berlin Germany, 162-177.
-
(2002)
Advances in Cryptology - CRYPTO
, vol.2442
, pp. 162-177
-
-
Bellare, M.1
Palacio, A.2
-
4
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
E. Biham, ed. LNCS, Springer-Verlag, Berlin
-
BONEH, D., GENTRY, C., LYNN, B., AND SHACHAM, H. 2003. Aggregate and verifiably encrypted signatures from bilinear maps. In Advances in Cryptology - EUROCRYPT, E. Biham, ed. LNCS, Springer-Verlag, Berlin.
-
(2003)
Advances in Cryptology - EUROCRYPT
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
5
-
-
84937411766
-
Attacking and repairing batch verification schemes
-
BOYD, C. AND PAVLOVSKI, C. 2000. Attacking and repairing batch verification schemes. In Asiacrypt. 58-71.
-
(2000)
Asiacrypt.
, pp. 58-71
-
-
Boyd, C.1
Pavlovski, C.2
-
6
-
-
0008317070
-
Group signature schemes and paymen systems based on the discrete logarithm problem
-
Hartung-Gorre Verlag, Konstanz, Germany
-
CAMENISCH, J. 1998. Group signature schemes and paymen systems based on the discrete logarithm problem, vol. 2, ETH-Series in Information Security and Cryptography. Hartung-Gorre Verlag, Konstanz, Germany.
-
(1998)
ETH-Series in Information Security and Cryptography
, vol.2
-
-
Camenisch, J.1
-
7
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Springer-Verlag, Berlin Germany
-
CAMENISCH, J. AND STADLER, M. 1997. Efficient group signature schemes for large groups. In Advances in Cryptology - CRYPTO, vol. 1294, Springer-Verlag, Berlin Germany. 410-424.
-
(1997)
Advances in Cryptology - CRYPTO
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
8
-
-
0003701129
-
Private information retrieval by keywords
-
Technion, University
-
CHOR, B., GILBOA, N., AND NAOR, M. 1997. Private information retrieval by keywords. Tech. Rep. TR CS0917, Technion, University.
-
(1997)
Tech. Rep.
, vol.TR CS0917
-
-
Chor, B.1
Gilboa, N.2
Naor, M.3
-
9
-
-
0032201622
-
Private information retrieval
-
CHOR, B., GOLDREICH, O., KUSHILEVITZ, E., AND SUDAN, M. 1998. Private information retrieval. J. ACM 45, 6 (Nov.), 965-981.
-
(1998)
J. ACM
, vol.45
, Issue.6 NOV.
, pp. 965-981
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
10
-
-
77958484856
-
Authentic third-party data publication
-
DEVANBU, P., GERTZ, M., MARTEL, C., AND STUBBLEBINE, S. G. 2000. Authentic third-party data publication. In Proceedings of the 14th IFIP 11.3 Working Conference in Database Security, 101-112.
-
(2000)
Proceedings of the 14th IFIP 11.3 Working Conference in Database Security
, pp. 101-112
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.G.4
-
11
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. M. Odlyzko, ed, Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany, Santa
-
FIAT, A. AND SHAMIR, A. 1987. How to prove yourself: practical solutions to identification and signature problems. In Advances in Cryptology - CRYPTO '86, A. M. Odlyzko, ed, Lecture Notes in Computer Science, vol. 263, Springer-Verlag, Berlin Germany, Santa, 186-194.
-
(1987)
Advances in Cryptology - CRYPTO '86
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
12
-
-
84921021973
-
Batch RSA
-
G. Brassard, ed. Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany
-
FIAT, A. 1990. Batch RSA. In Advances in Cryptology - CRYPTO '89, G. Brassard, ed. Lecture Notes in Computer Science, vol. 435, Springer-Verlag, Berlin Germany, 175-185.
-
(1990)
Advances in Cryptology - CRYPTO '89
, vol.435
, pp. 175-185
-
-
Fiat, A.1
-
13
-
-
0013458877
-
Batch RSA
-
FIAT, A. 1997. Batch RSA. J. Cryptology 10, 2, 75-88.
-
(1997)
J. Cryptology
, vol.10
, Issue.2
, pp. 75-88
-
-
Fiat, A.1
-
14
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Dallas, TX
-
GERTNER, Y., ISHAI, Y., KUSHILEVITZ, E., AND MALKIN, T. 1998. Protecting data privacy in private information retrieval schemes. In Proceedings of the 30th Annual Symposium on Theory of Computing (STOC) (Dallas, TX).
-
(1998)
Proceedings of the 30th Annual Symposium on Theory of Computing (STOC)
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
15
-
-
33745785145
-
Secure indexes for efficient searching on encrypted compressed data
-
GOH, E.-J. 2003. Secure indexes for efficient searching on encrypted compressed data. Cryptology ePrint Archive, Rep. 2003/216 http://eprint.iacr. org/2003/216/
-
(2003)
Cryptology ePrint Archive, Rep.
, vol.2003
, Issue.216
-
-
Goh, E.-J.1
-
16
-
-
0345270373
-
A "paradoxical" identity-based signature scheme resulting from zero-knowledge
-
S. Goldwasser, ed. Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany
-
GUILLOU, L. AND QUISQUATER, J. J. 1988. A "paradoxical" identity-based signature scheme resulting from zero-knowledge. In Advances in Cryptology - CRYPTO, S. Goldwasser, ed. Lecture Notes in Computer Science, vol. 403, Springer-Verlag, Berlin Germany.
-
(1988)
Advances in Cryptology - CRYPTO
, vol.403
-
-
Guillou, L.1
Quisquater, J.J.2
-
17
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
HACIGÜMÜŞ, H., IYER, B., LI, C., AND MEHROTRA, S. 2002. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the ACM SIGMOD Conference on Management of Data, 216-227.
-
(2002)
Proceedings of the ACM SIGMOD Conference on Management of Data
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
20
-
-
0029254027
-
DSA-Type secure interactive batch verification protocols
-
HARN, L. 1995. DSA-Type secure interactive batch verification protocols. Electron. Lett. 31, 4 (Feb.), 257-258.
-
(1995)
Electron. Lett.
, vol.31
, Issue.4 FEB.
, pp. 257-258
-
-
Harn, L.1
-
21
-
-
0032051077
-
Batch verifying multiple DSA-Type digital signatures
-
HARN, L. 1998a. Batch verifying multiple DSA-Type digital signatures. Electron. Lett. 34, 9 (Apr.), 870-871.
-
(1998)
Electron. Lett.
, vol.34
, Issue.9 APR.
, pp. 870-871
-
-
Harn, L.1
-
22
-
-
11744310046
-
Batch verifying RSA signatures
-
HARN, L. 1998b. Batch verifying RSA signatures. Electron. Lett. 34, 12 (Apr.), 1219-1220.
-
(1998)
Electron. Lett.
, vol.34
, Issue.12 APR.
, pp. 1219-1220
-
-
Harn, L.1
-
23
-
-
0038087188
-
Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups
-
JOUX, A. AND NGUYEN, K. 2001. Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups. In Cryptology ePrint Archive. Number Rep. 2001/003.
-
(2001)
Cryptology ePrint Archive. Number Rep. 2001/003
, vol.2001
, Issue.3
-
-
Joux, A.1
Nguyen, K.2
-
27
-
-
84858948564
-
-
MIRACL, LIBRARY. 2006 http://indigo.ie/~mscott
-
(2006)
-
-
-
30
-
-
0041863206
-
Can DSA be improved: Complexity trade-offs with the digital signature standard
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany
-
NACCACHE, D., M'RAÏHI, D., RAPHAELI, D., AND VAUDENAY, S. 1994. Can DSA be improved: Complexity trade-offs with the digital signature standard. In Advances in Cryptology - EUROCRYPT, Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany, 85-94.
-
(1994)
Advances in Cryptology - EUROCRYPT
, pp. 85-94
-
-
Naccache, D.1
M'Raïhi, D.2
Raphaeli, D.3
Vaudenay, S.4
-
32
-
-
84858948565
-
-
OPENSSL PROJECT. 2006. http://www.openssl.org
-
(2006)
-
-
-
34
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. M. 1978. A method for obtaining digital signatures and public-key cryptosystems. Communi. ACM 21, 2 (Feb.), 120-126.
-
(1978)
Communi. ACM
, vol.21
, Issue.2 FEB.
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
36
-
-
8744256700
-
-
HR 3763, PL 107-204, 116 Stat 745. Codified in sections 11, 15, 18, 28, and 29 USC
-
UNITED STATES CODE. 2002. Sarbanes-Oxley act of 2002, HR 3763, PL 107-204, 116 Stat 745. Codified in sections 11, 15, 18, 28, and 29 USC.
-
(2002)
Sarbanes-oxley Act of 2002
-
-
-
37
-
-
0029342134
-
Improved digital signature suitable for batch verification
-
YEN, S. AND LAIH, C. 1995. Improved digital signature suitable for batch verification. IEEE Trans. Comput. 44, 7 (July), 957-959.
-
(1995)
IEEE Trans. Comput.
, vol.44
, Issue.7 JULY
, pp. 957-959
-
-
Yen, S.1
Laih, C.2
|