-
2
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. Advances in Cryptology - Crypto (1987) 186-194
-
(1987)
Advances in Cryptology - Crypto
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
3
-
-
5744224341
-
Fast Batch Verification for Modular Exponentiation and Digital Signatures
-
Bellare, M., Garay, J., Rabin, T.: Fast Batch Verification for Modular Exponentiation and Digital Signatures. Eurocrypt, volume 1403 (1998) pages 191-2048
-
(1998)
Eurocrypt
, vol.1403
, pp. 191-2048
-
-
Bellare, M.1
Garay, J.2
Rabin, T.3
-
4
-
-
84937408891
-
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks
-
Bellare, M., Palacio, A.: GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. Advances in Cryptology - Crypto (1992) 162-177
-
(1992)
Advances in Cryptology - Crypto
, pp. 162-177
-
-
Bellare, M.1
Palacio, A.2
-
6
-
-
21144441197
-
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
-
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Eurocrypt (1993)
-
(1993)
Eurocrypt
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
7
-
-
0002507165
-
Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem
-
ISBN 3-89649-286-1, Hartung-Gorre Verlag, Konstanz
-
Camenisch, J.: Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem. Vol. 2 of ETH-Series in Information Security an Cryptography, ISBN 3-89649-286-1, Hartung-Gorre Verlag, Konstanz (1998)
-
(1998)
ETH-Series in Information Security An Cryptography
, vol.2
-
-
Camenisch, J.1
-
9
-
-
0032201622
-
Private Information Retrieval
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private Information Retrieval. Journal of ACM (1998) 965-981
-
(1998)
Journal of ACM
, pp. 965-981
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
10
-
-
77958484856
-
Authentic third-party data publication
-
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic third-party data publication. 14th IFIP Working Conference in Database Security (2000) 101-112
-
(2000)
14th IFIP Working Conference in Database Security
, pp. 101-112
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.4
-
11
-
-
35048848256
-
-
ACM Press
-
Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting Data Privacy in Private Information Retrieval Schemes 30th Annual Symposium on Theory of Computing (STOC) ACM Press (1998)
-
(1998)
Protecting Data Privacy in Private Information Retrieval Schemes 30th Annual Symposium on Theory of Computing (STOC)
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
12
-
-
33745785145
-
Secure Indexes for Efficient Searching on Encrypted Compressed Data
-
Goh, E.: Secure Indexes for Efficient Searching on Encrypted Compressed Data. Cryptology ePrint Archive, Report 2003/216 (2003)
-
(2003)
Cryptology EPrint Archive, Report 2003/216
-
-
Goh, E.1
-
13
-
-
84947558992
-
A "Paradoxical" Identity-Based Signature Scheme Resulting from Zero-Knowledge
-
Guillou L., Quisquater, J.: A "Paradoxical" Identity-Based Signature Scheme Resulting from Zero-Knowledge. Advances in Cryptology - Crypto (1998) 216-231
-
(1998)
Advances in Cryptology - Crypto
, pp. 216-231
-
-
Guillou, L.1
Quisquater, J.2
-
14
-
-
0036361105
-
Executing SQL over Encrypted Data in the Database-Service-Provider Model
-
Hacigümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in the Database-Service-Provider Model. ACM SIGMOD Conference on Management of Data (2002) 216-227
-
(2002)
ACM SIGMOD Conference on Management of Data
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
16
-
-
0036204131
-
Providing Database as a Service
-
Hacigümüş, H., Iyer, B., Li, C., Mehrotra, S.: Providing Database as a Service. International Conference on Data Engineering (2002)
-
(2002)
International Conference on Data Engineering
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
17
-
-
0038087188
-
Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups
-
Joux, A., Nguyen, K.: Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups. Cryptology ePrint Archive, Report 2001/003 (2001)
-
(2001)
Cryptology EPrint Archive, Report 2001/003
-
-
Joux, A.1
Nguyen, K.2
-
18
-
-
21044438930
-
A General Model for authenticated data structures
-
Martel, C., Nuckolls, G., Devanbu, P., Gertz, M., Kwong, A., Stubblebine, S.: A General Model for authenticated data structures. Algorithmica, Volume 39 (2004)
-
(2004)
Algorithmica
, vol.39
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.6
-
20
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM (1978) 120-126
-
(1978)
Communications of the ACM
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
|