-
2
-
-
84969361839
-
How to sign given any trapdoor function
-
Gol88
-
Mihir Bellare and Silvio Micali. How to sign given any trapdoor function. In Goldwasser [Gol88], pages 200-215.
-
Goldwasser
, pp. 200-215
-
-
Bellare, M.1
Micali, S.2
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
November Revised version
-
Mihir Bellare and Phillip Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communication Security, pages 62-73, November 1993. Revised version available from http://www.cs.ucsd.edu/~mihir/.
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communication Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84947906522
-
The exact security of digital signatures: How to sign with RSA and Rabin
-
Ueli Maurer, editor, Advances in Cryptology - EUROCRYPT 96, Springer-Verlag, 12-16 May 1996. Revised version appears in
-
Mihir Bellare and Phillip Rogaway. The exact security of digital signatures: How to sign with RSA and Rabin. In Ueli Maurer, editor, Advances in Cryptology - EUROCRYPT 96, volume 1070 of Lecture Notes in Computer Science, pages 399-416. Springer-Verlag, 12-16 May 1996. Revised version appears in http://www-cse.ucsd.edu/users/mihir/papers/crypto-papers.html.
-
Lecture Notes in Computer Science
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84921068281
-
On the exact security of full domain hash
-
Mihir Bellare, editor, Advances in Cryptology - CRYPTO 2000, Springer-Verlag, 20-24 August
-
Jean-Sébastian Coron. On the exact security of full domain hash. In Mihir Bellare, editor, Advances in Cryptology - CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 229-235. Springer-Verlag, 20-24 August 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 229-235
-
-
Coron, J.-S.1
-
6
-
-
84947215491
-
Optimal security proofs for PSS and other signature schemes
-
Lars Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, Springer-Verlag, 28 April-2 May
-
Jean-Sébastian Coron. Optimal security proofs for PSS and other signature schemes. In Lars Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 272-287. Springer-Verlag, 28 April-2 May 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 272-287
-
-
Coron, J.-S.1
-
7
-
-
85028868533
-
Collision-free hash functions and public-key signature schemes
-
David Chaum and Wyn L. Price, editors, Advances in Cryptology - EUROCRYPT 87, Springer-Verlag, 13-15 April 1987
-
Ivan Damgård. Collision-free hash functions and public-key signature schemes. In David Chaum and Wyn L. Price, editors, Advances in Cryptology - EUROCRYPT 87, volume 304 of Lecture Notes in Computer Science. Springer-Verlag, 1988, 13-15 April 1987.
-
(1988)
Lecture Notes in Computer Science
, vol.304
-
-
Damgård, I.1
-
8
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Andrew M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, Springer-Verlag, 11-15 August 1986
-
Amos Fiat and Adi Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Andrew M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, volume 263 of Lecture Notes in Computer Science, pages 186-194. Springer-Verlag, 1987, 11-15 August 1986.
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
9
-
-
35248860993
-
-
Technical Report 2002-22, DIMACS: Center for Discrete Mathematics and Theoretical Computer Science
-
Rosario Gennaro, Yael Gertner, and Jonathan Katz. Bounds on the efficiency of encryption and digital signatures. Technical Report 2002-22, DIMACS: Center for Discrete Mathematics and Theoretical Computer Science, 2002. Available from http://dimacs.rutgers.edu/TechnicalReports/2002.html.
-
(2002)
Bounds on the Efficiency of Encryption and Digital Signatures
-
-
Gennaro, R.1
Gertner, Y.2
Katz, J.3
-
10
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, April 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
11
-
-
0035172306
-
On the impossibility of basing trapdoor functions on trapdoor predicates
-
Las Vegas, Nevada, October IEEE
-
Yael Gertner, Tal Malkin, and Omer Reingold. On the impossibility of basing trapdoor functions on trapdoor predicates. In 42nd Annual Symposium on Foundations of Computer Science, Las Vegas, Nevada, October 2001. IEEE.
-
(2001)
42nd Annual Symposium on Foundations of Computer Science
-
-
Gertner, Y.1
Malkin, T.2
Reingold, O.3
-
12
-
-
0000966673
-
Advances in Cryptology - CRYPTO '88
-
Shafi Goldwasser, editor. Springer-Verlag, 21-25 August 1988
-
Shafi Goldwasser, editor. Advances in Cryptology - CRYPTO '88, volume 403 of Lecture Notes in Computer Science. Springer-Verlag, 1990, 21-25 August 1988.
-
(1990)
Lecture Notes in Computer Science
, vol.403
-
-
-
13
-
-
84947558992
-
A "paradoxical" indentity-based signature scheme resulting from zero-knowledge
-
Gol88
-
Louis Claude Guillou and Jean-Jacques Quisquater. A "paradoxical" indentity-based signature scheme resulting from zero-knowledge. In Goldwasser [Gol88], pages 216-231.
-
Goldwasser
, pp. 216-231
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
14
-
-
0034496969
-
Lower bounds on the efficiency of generic cryptographic constructions
-
Redondo Beach, California, November IEEE
-
Rosario Gennaro and Luca Trevisan. Lower bounds on the efficiency of generic cryptographic constructions. In 41st Annual Symposium on Foundations of Computer Science, Redondo Beach, California, November 2000. IEEE.
-
(2000)
41st Annual Symposium on Foundations of Computer Science
-
-
Gennaro, R.1
Trevisan, L.2
-
15
-
-
0024866742
-
Limits on the provable consequences of one-way permutations
-
ACM89
-
Russell Impagliazzo and Steven Rudich. Limits on the provable consequences of one-way permutations. In ACM [ACM89], pages 44-61.
-
ACM
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
18
-
-
33746441852
-
-
Technical Report MIT/LCS/TM-501, Massachusetts Institute of Technology, Cambridge, MA, March
-
Silvio Micali. A secure and efficient digital signature algorithm. Technical Report MIT/LCS/TM-501, Massachusetts Institute of Technology, Cambridge, MA, March 1994.
-
(1994)
A Secure and Efficient Digital Signature Algorithm
-
-
Micali, S.1
-
19
-
-
0344839013
-
Improving the exact security of digital signature schemes
-
Silvio Micali and Leonid Reyzin. Improving the exact security of digital signature schemes. Journal of Cryptology, 15:1-18, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, pp. 1-18
-
-
Micali, S.1
Reyzin, L.2
-
20
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
ACM89
-
Moni Naor and Moti Yung. Universal one-way hash functions and their cryptographic applications. In ACM [ACM89], pages 33-43.
-
ACM
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
21
-
-
33745972475
-
Fast signature generation with a Fiat Shamir-like scheme
-
I. B. Damgård, editor, Advances in Cryptology - EUROCRYPT 90, Springer-Verlag, 21-24 May 1990
-
Heidroon Ong and Claus P. Schnorr. Fast signature generation with a Fiat Shamir-like scheme. In I. B. Damgård, editor, Advances in Cryptology - EUROCRYPT 90, volume 473 of Lecture Notes in Computer Science, pages 432-440. Springer-Verlag, 1991, 21-24 May 1990.
-
(1991)
Lecture Notes in Computer Science
, vol.473
, pp. 432-440
-
-
Ong, H.1
Schnorr, C.P.2
-
22
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Jacques Stern, editor, Advances in Cryptology - EUROCRYPT '99, Springer-Verlag, 2-6 May
-
Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Jacques Stern, editor, Advances in Cryptology - EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science. Springer-Verlag, 2-6 May 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
-
-
Paillier, P.1
-
23
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
Baltimore, Maryland, 14-16 May
-
John Rompel. One-way functions are necessary and sufficient for secure signatures. In Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing, pages 387-394, Baltimore, Maryland, 14-16 May 1990.
-
(1990)
Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing
, pp. 387-394
-
-
Rompel, J.1
-
24
-
-
84957690790
-
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions
-
Kaisa Nyberg, editor, Advances in Cryptology - EUROCRYPT 98, Springer-Verlag, May 31-June 4
-
Daniel R. Simon. Finding collisions on a one-way street: Can secure hash functions be based on general assumptions. In Kaisa Nyberg, editor, Advances in Cryptology - EUROCRYPT 98, volume 1403 of Lecture Notes in Computer Science. Springer-Verlag, May 31-June 4 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
-
-
Simon, D.R.1
|