-
1
-
-
84947778144
-
The decision Diffie-Hellman problem
-
Springer-Verlag
-
D. Boneh. The decision Diffie-Hellman problem. In Proc. of ANTS-III, volume 1423 of LNCS, pages 48–63. Springer-Verlag, 1998.
-
(1998)
Proc. Of ANTS-III, Volume 1423 Of LNCS
, pp. 48-63
-
-
Boneh, D.1
-
2
-
-
84958664495
-
Efficient publicly verifiable secret sharing schemes with fast or delayed recovery
-
pringer-Verlag
-
F. Boudot and J. Traoré. Efficient publicly verifiable secret sharing schemes with fast or delayed recovery. In ICICS’99, volume 1726 of LNCS, pages 87–102. Springer-Verlag, 1999.
-
(1999)
ICICS’99, Volume 1726 of LNCS
, pp. 87-102
-
-
Boudot, F.1
Traoré, J.2
-
3
-
-
0009346188
-
Practical zero-knowledge proofs: Giving hints and using deficiencies
-
J. Boyar, K. Friedl, and C. Lund. Practical zero-knowledge proofs: Giving hints and using deficiencies. Journal of Cryptology, 4(3):185–206, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 185-206
-
-
Boyar, J.1
Friedl, K.2
Lund, C.3
-
4
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
B. Pfitzmann, editor, Springer-Verlag
-
J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In B. Pfitzmann, editor, Eurocrypt’01, volume 2045 of LNCS, pages 93–117. Springer-Verlag, 2001.
-
(2001)
Eurocrypt’01, Volume 2045 of LNCS
, pp. 93-117
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
5
-
-
84921060028
-
Separability and efficiency for generic group signature schemes
-
Springer-Verlag
-
J. Camenisch and M. Michels. Separability and efficiency for generic group signature schemes. In M. Wiener, editor, Crypto’99, volume 1666 of LNCS, pages 413–430. Springer-Verlag, 1999.
-
(1999)
M. Wiener, Editor, Crypto’99, Volume 1666 of LNCS
, pp. 413-430
-
-
Camenisch, J.1
Michels, M.2
-
6
-
-
0035751083
-
Paillier’s cryptosystem revisited
-
P. Samarati, editor, ACM Press, To appear
-
D. Catalano, R. Gennaro, N. Howgrave-Graham, and P. Q. Nguyen. Paillier’s cryptosystem revisited. In P. Samarati, editor, 8th ACM Conference on Computer and Communications Security. ACM Press, 2001. To appear.
-
(2001)
8Th ACM Conference on Computer and Communications Security
-
-
Catalano, D.1
Gennaro, R.2
Howgrave-Graham, N.3
Nguyen, P.Q.4
-
7
-
-
0010252194
-
Undeniable signatures
-
G. Brassard, editor, Springer-Verlag
-
D. Chaum and H. Van Antwerpen. Undeniable signatures. In G. Brassard, editor, Crypto’89, volume 435 of LNCS, pages 212–216. Springer-Verlag, 1989.
-
(1989)
Crypto’89, Volume 435 of LNCS
, pp. 212-216
-
-
Chaum, D.1
Van Antwerpen, H.2
-
8
-
-
84867553981
-
A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system
-
Springer-Verlag
-
I. Damgård and M. Jurik. A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In PKC’01, volume 1992 of LNCS, pages 119–136. Springer-Verlag, 2001.
-
(2001)
PKC’01, Volume 1992 of LNCS
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
9
-
-
0029720071
-
Digital signets: Self-enforcing protection of digital information
-
ACM
-
C. Dwork, J. Lotspiech, and M. Naor. Digital signets: Self-enforcing protection of digital information. In Proc. of 28th STOC, pages 489–498. ACM, 1996.
-
(1996)
Proc. Of 28Th STOC
, pp. 489-498
-
-
Dwork, C.1
Lotspiech, J.2
Naor, M.3
-
10
-
-
84957685616
-
A practical and provably secure scheme for publicly verifiable secret sharing and its applications
-
K. Nyberg, editor, Springer-Verlag
-
E. Fujisaki and T. Okamoto. A practical and provably secure scheme for publicly verifiable secret sharing and its applications. In K. Nyberg, editor, Eurocrypt’98, volume 1403 of LNCS, pages 32–46. Springer-Verlag, 1998.
-
(1998)
Eurocrypt’98, Volume 1403 of LNCS
, pp. 32-46
-
-
Fujisaki, E.1
Okamoto, T.2
-
11
-
-
0024716009
-
Minimum-knowledge interactive proofs for decision problems
-
Z. Galil, S. Haber, and M. Yung. Minimum-knowledge interactive proofs for decision problems. Siam J. of Computing, 18(4):711–739, 1989.
-
(1989)
Siam J. Of Computing
, vol.18
, Issue.4
, pp. 711-739
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
12
-
-
84958670348
-
RSA-based undeniable signatures
-
B. Kaliski, editor, Springer- Verlag
-
R. Gennaro, H. Krawczyk, and T. Rabin. RSA-based undeniable signatures. In B. Kaliski, editor, Crypto’97, volume 1294 of LNCS, pages 132–149. Springer- Verlag, 1997.
-
(1997)
Crypto’97, Volume 1294 of LNCS
, pp. 132-149
-
-
Gennaro, R.1
Krawczyk, H.2
Rabin, T.3
-
14
-
-
84957707067
-
Self-delegation with controlled propagation - Or what if you lose your laptop
-
H. Krawczyk, Springer-Verlag
-
O. Goldreich, B. Pfitzmann, and R. L. Rivest. Self-delegation with controlled propagation - or what if you lose your laptop. In H. Krawczyk, editor, Crypto’98, volume 1462 of LNCS, pages 153–168. Springer-Verlag, 1998.
-
(1998)
Crypto’98, Volume 1462 of LNCS
, pp. 153-168
-
-
Goldreich, O.1
Pfitzmann, B.2
Rivest, R.L.3
-
15
-
-
85028761718
-
A simple and secure way to show the validity of your public key
-
B. Kaliski, Springer-Verlag
-
J. van de Graaf and R. Peralta. A simple and secure way to show the validity of your public key. In B. Kaliski, editor, Crypto’87, volume 293 of LNCS, pages 128–134. Springer-Verlag, 1987.
-
(1987)
Crypto’87, Volume 293 of LNCS
, pp. 128-134
-
-
Van De Graaf, J.1
Peralta, R.2
-
16
-
-
84927752554
-
Designated verifier proofs and their applications
-
U. Maurer, editor, Springer- Verlag
-
M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In U. Maurer, editor, Eurocrypt’96, LNCS, pages 143–154. Springer- Verlag, 1996.
-
(1996)
Eurocrypt’96, LNCS
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
17
-
-
0003482564
-
Information Hiding Techniques for Steganography and Digital Watermarking
-
S. Katezenbeisser and F.A.P. Petitcolas, editors. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 1999.
-
(1999)
Artech House
-
-
Katezenbeisser, S.1
Petitcolas, F.2
-
19
-
-
84944958763
-
-
1 September, URL
-
Bloomberg News. Ad-revenue worries weigh down Yahoo. 1 September 2000. URL: http://yahoo.cnet.com/news/0-1005-200-2670551.html.
-
(2000)
Ad-Revenue Worries Weigh down Yahoo
-
-
-
20
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
J. Stern, editor, Springer- Verlag
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In J. Stern, editor, Eurocrypt’99, volume 1592 of LNCS, pages 223–238. Springer- Verlag, 1999.
-
(1999)
Eurocrypt’99, Volume 1592 of LNCS
, pp. 223-238
-
-
Paillier, P.1
-
21
-
-
84948969076
-
Fair encryption of RSA keys
-
B. Preneel, Springer-Verlag
-
G. Poupard and J. Stern. Fair encryption of RSA keys. In B. Preneel, editor, Eurocrypt’00, volume 1807 of LNCS, pages 173–190. Springer-Verlag, 2000.
-
(2000)
Eurocrypt’00, Volume 1807 of LNCS
, pp. 173-190
-
-
Poupard, G.1
Stern, J.2
-
22
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4:161–174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
23
-
-
84957673202
-
Auto-recoverable auto-certifiable cryptosystems
-
K. Nyberg, editor, Springer-Verlag
-
A. Young and M. Yung. Auto-recoverable auto-certifiable cryptosystems. In K. Nyberg, editor, Eurocrypt’98, volume 1403 of LNCS, pages 17–31. Springer-Verlag, 1998.
-
(1998)
Eurocrypt’98, Volume 1403 of LNCS
, pp. 17-31
-
-
Young, A.1
Yung, M.2
|