-
1
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
H. Krawczyk, editor, Proceedings of Crypto 1998, Springer-Verlag, Aug
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In H. Krawczyk, editor, Proceedings of Crypto 1998, volume 1462 of LNCS, pages 26-45. Springer-Verlag, Aug 1998.
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
3
-
-
0032687056
-
Secure computation with honest-looking parties: What if nobody is truly honest?
-
ACM, ACM Press, May
-
R. Canetti and R. Ostrovsky. Secure computation with honest-looking parties: What if nobody is truly honest? In Proceedings of the 31st Symposium on Theory of Computing, pages 255-264. ACM, ACM Press, May 1999.
-
(1999)
Proceedings of the 31st Symposium on Theory of Computing
, pp. 255-264
-
-
Canetti, R.1
Ostrovsky, R.2
-
4
-
-
84855621167
-
-
Technical report, Georgetown University, Feb
-
D. Denning. Descriptions of key escrow systems. Technical report, Georgetown University, Feb 1997. http://www.cs.georgetown.edu/∼denning/.
-
(1997)
Descriptions of Key Escrow Systems
-
-
Denning, D.1
-
6
-
-
85031800805
-
Abuses in cryptography and how to fight them
-
S. Goldwasser, editor, Proceedings of Crypto 1988, Springer-Verlag, Aug
-
Y. Desmedt. Abuses in cryptography and how to fight them. In S. Goldwasser, editor, Proceedings of Crypto 1988, volume 403 of LNCS, pages 375-389. Springer-Verlag, Aug 1988.
-
(1988)
LNCS
, vol.403
, pp. 375-389
-
-
Desmedt, Y.1
-
7
-
-
85028745474
-
Special uses and abuses of the Fiat-Shamir passport protocol
-
C. Pomerance, editor, Proceedings of Crypto 1987, Springer-Verlag, Aug
-
Y. Desmedt, G. Goutier, and S. Bengio. Special uses and abuses of the Fiat-Shamir passport protocol. In C. Pomerance, editor, Proceedings of Crypto 1987, volume 293 of LNCS, pages 21-39. Springer-Verlag, Aug 1987.
-
(1987)
LNCS
, vol.293
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, G.2
Bengio, S.3
-
12
-
-
84957640277
-
Fair cryptosystems, revisited: A rigorous approach to key-escrow
-
D. Coppersmith, editor, Proceedings of Crypto 1995, Springer-Verlag, Aug
-
J. Kilian and T. Leighton. Fair cryptosystems, revisited: A rigorous approach to key-escrow. In D. Coppersmith, editor, Proceedings of Crypto 1995, volume 963 of LNCS, pages 208-221. Springer-Verlag, Aug 1995.
-
(1995)
LNCS
, vol.963
, pp. 208-221
-
-
Kilian, J.1
Leighton, T.2
-
14
-
-
0015672289
-
A note on the confinement problem
-
Oct
-
B. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, Oct 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
15
-
-
0027663154
-
Elliptic curve cryptosystems and their implementations
-
A. J. Menezes and S. A. Vanstone. Elliptic curve cryptosystems and their implementations. Journal of Cryptology, 6(4):209-224, 1993.
-
(1993)
Journal of Cryptology
, vol.6
, Issue.4
, pp. 209-224
-
-
Menezes, A.J.1
Vanstone, S.A.2
-
16
-
-
0003584029
-
-
FIPS 140-2, NIST, Jun
-
National Institute of Standards and Technology. Security requirements for cryptographic modules. FIPS 140-2, NIST, Jun 2001. http://csrc.nist.gov/publications/fips/.
-
(2001)
Security Requirements for Cryptographic Modules
-
-
-
17
-
-
84855632678
-
-
OpenSSL Project. http://www.openssl.org/.
-
-
-
-
20
-
-
84855632676
-
-
secsh IETF Working Group. http://www.ietf.org/html.charters/secsh-charter.html.
-
-
-
-
21
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
D. Chaum, editor, Plenum Press, Aug
-
G. J. Simmons. The prisoners' problem and the subliminal channel. In D. Chaum, editor, Proceedings of Crypto 1983, pages 51-67. Plenum Press, Aug 1983.
-
(1983)
Proceedings of Crypto 1983
, pp. 51-67
-
-
Simmons, G.J.1
-
22
-
-
84985824882
-
The subliminal channel and digital signatures
-
T. Beth, N. Cot, and I. Ingemarsson, editors, Proceedings of Eurocrypt 1984, Springer-Verlag, Apr
-
G. J. Simmons. The subliminal channel and digital signatures. In T. Beth, N. Cot, and I. Ingemarsson, editors, Proceedings of Eurocrypt 1984, volume 0209 of LNCS, pages 364-378. Springer-Verlag, Apr 1984.
-
(1984)
LNCS
, vol.209
, pp. 364-378
-
-
Simmons, G.J.1
-
23
-
-
84955586344
-
The dark side of "black-box" cryptography, or: Should we trust Capstone
-
N. Koblitz, editor, Proceedings of Crypto 1996, Springer-Verlag, Aug
-
A. Young and M. Yung. The dark side of "black-box" cryptography, or: Should we trust Capstone. In N. Koblitz, editor, Proceedings of Crypto 1996, volume 1109 of LNCS, pages 89-103. Springer-Verlag, Aug 1996.
-
(1996)
LNCS
, vol.1109
, pp. 89-103
-
-
Young, A.1
Yung, M.2
-
24
-
-
84957360674
-
Kleptography: Using cryptography against cryptography
-
W. Fumy, editor, Proceedings of Eurocrypt 1997, Springer-Verlag, May
-
A. Young and M. Yung. Kleptography: Using cryptography against cryptography. In W. Fumy, editor, Proceedings of Eurocrypt 1997, volume 1233 of LNCS, pages 62-74. Springer-Verlag, May 1997.
-
(1997)
LNCS
, vol.1233
, pp. 62-74
-
-
Young, A.1
Yung, M.2
|