-
3
-
-
85034660220
-
Subliminal-free authentication and signature
-
Advances in Cryptology, Eurocrypt '88, Springer-verlag
-
Y. Desmedt. Subliminal-free authentication and signature. In Advances in Cryptology - Eurocrypt '88, LNCS 330. Springer-verlag, 1988. pp. 23-33.
-
(1988)
LNCS
, vol.330
, pp. 23-33
-
-
Desmedt, Y.1
-
4
-
-
84990731886
-
How to prove yourself: Practical Solution to Identification and Signature Problems
-
Advances in Cryptology, Crypto'86, SpringerVerlag
-
A. Fiat and A. Shamir. How to prove yourself: Practical Solution to Identification and Signature Problems. In Advances in Cryptology - Crypto'86, LNCS 26. SpringerVerlag, 1987. pp.186-194
-
(1987)
LNCS
, vol.26
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
5
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, Vol. 17, No. 2, 1988. pp. 281-308.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
6
-
-
0034448545
-
-
J. Håstad, J. Jonsson, A. Juels, and M. Yung. Funkspiel Schemes: An Alternative to Conventional Tamper Resistance. In S. Jajodia, ed., Seventh ACM Conference on Computer and Communications Security, ACM Press, 2000. pp 125-133.
-
J. Håstad, J. Jonsson, A. Juels, and M. Yung. Funkspiel Schemes: An Alternative to Conventional Tamper Resistance. In S. Jajodia, ed., Seventh ACM Conference on Computer and Communications Security, ACM Press, 2000. pp 125-133.
-
-
-
-
7
-
-
36949028531
-
-
J. Jonsson and B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. Internet RFC 3447. pp. 26-42, February 2003.
-
J. Jonsson and B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. Internet RFC 3447. pp. 26-42, February 2003.
-
-
-
-
8
-
-
84957357388
-
Distributed "Magic Ink" Signatures
-
Advances in Cryptology, Eurocrypt '97, Springer-Verlag
-
M. Jakobsson and M. Yung. Distributed "Magic Ink" Signatures. In Advances in Cryptology - Eurocrypt '97, LNCS 1233, Springer-Verlag, 1997. pp. 450-464.
-
(1997)
LNCS
, vol.1233
, pp. 450-464
-
-
Jakobsson, M.1
Yung, M.2
-
9
-
-
84958981017
-
Generation with Verifiable Randomness
-
Public Key Cryptography 2002, Springer-Verlag
-
A. Juels and J. Guajardo. RSA Key Generation with Verifiable Randomness. In Public Key Cryptography 2002, LNCS 2274, Springer-Verlag, 2002. pp. 357-374.
-
(2002)
LNCS
, vol.2274
, pp. 357-374
-
-
Juels, A.1
Guajardo, J.2
Key, R.S.A.3
-
11
-
-
36949011205
-
-
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook Applied Cryptography. CRC Press, 1997. pp. 447-AA9
-
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook Applied Cryptography. CRC Press, 1997. pp. 447-AA9
-
-
-
-
12
-
-
85077591735
-
Cryptographic Voting Protocols: A Systems Perspective
-
August
-
C. Karlof, N. Sastry, and D. Wagner, Cryptographic Voting Protocols: A Systems Perspective. In USENIX Security '05, August 2005. pp. 33-50.
-
(2005)
USENIX Security '05
, pp. 33-50
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
13
-
-
0003455038
-
-
Ph.D. dissertation, Dept. of Electrical Engineering, Stanford Univ
-
R. Merkle. Secrecy, authentication, and public key systems. Ph.D. dissertation, Dept. of Electrical Engineering, Stanford Univ., 1979.
-
(1979)
Secrecy, authentication, and public key systems
-
-
Merkle, R.1
-
15
-
-
84927727752
-
Security proofs for signature schemes
-
Advances in Cryptology, Eurocrypt '96, Springer-Verlag
-
D. Pointcheval and J. Stern. Security proofs for signature schemes. In Advances in Cryptology - Eurocrypt '96, LNCS 1070, Springer-Verlag, 1996. pp. 387-398.
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
16
-
-
33750079066
-
Electronic Voting Systems - Is Brazil Ahead of its Time?
-
Pedro A.D. Rezende. Electronic Voting Systems - Is Brazil Ahead of its Time? RSA CryptoBytes, Volume 7, No. 2, 2004.
-
(2004)
RSA CryptoBytes
, vol.7
, Issue.2
-
-
Rezende, P.A.D.1
-
17
-
-
0000537828
-
Efficient Signature Generation for Smart Cards
-
C. P. Schnorr. Efficient Signature Generation for Smart Cards. In Proc. of Crypto '89, 1989. pp. 239-252.
-
(1989)
Proc. of Crypto '89
, pp. 239-252
-
-
Schnorr, C.P.1
-
18
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
G. J. Simmons. The prisoners' problem and the subliminal channel. In Proc. of Crypto '83, 1983. pp. 51-67.
-
(1983)
Proc. of Crypto '83
, pp. 51-67
-
-
Simmons, G.J.1
-
19
-
-
84985824882
-
The subliminal channel and digital signature
-
Proc. of Eurocrypt '84, Springer-Verlag
-
G. J. Simmons. The subliminal channel and digital signature. In Proc. of Eurocrypt '84, LNCS 209, Springer-Verlag, 1996. pp. 364-378.
-
(1996)
LNCS
, vol.209
, pp. 364-378
-
-
Simmons, G.J.1
-
20
-
-
85028916857
-
Response to comments on the NIST proposed Digital Signature Standard
-
Proc. of Crypto '92, Springer-verlag
-
M. E. Smid and D. K. Branstad. Response to comments on the NIST proposed Digital Signature Standard. In Proc. of Crypto '92, LNCS 740, Springer-verlag, 1992. pp. 76-87.
-
(1992)
LNCS
, vol.740
, pp. 76-87
-
-
Smid, M.E.1
Branstad, D.K.2
-
21
-
-
84947917119
-
Publicly Verifiable Secret Sharing
-
Advances in Cryptology, Eurocrypt '96, Springer-Verlag
-
M. Stadler. Publicly Verifiable Secret Sharing. In Advances in Cryptology - Eurocrypt '96, LNCS 1070, Springer-Verlag, 1996. pp. 190-199.
-
(1996)
LNCS
, vol.1070
, pp. 190-199
-
-
Stadler, M.1
-
22
-
-
36949019781
-
Mitigating insider threats to RSA key generation
-
Spring
-
A. Young. Mitigating insider threats to RSA key generation. In Cryptobytes, Vol. 7, No 1, Spring 2004.
-
(2004)
Cryptobytes
, vol.7
, Issue.1
-
-
Young, A.1
-
23
-
-
84958645678
-
The prevalence of Kleptographic attacks on discrete-log based cryptosystems
-
A. Young and M. Yung. The prevalence of Kleptographic attacks on discrete-log based cryptosystems. In Proc. of Crypto '97, 1997. pp. 264-276.
-
(1997)
Proc. of Crypto '97
, pp. 264-276
-
-
Young, A.1
Yung, M.2
-
24
-
-
84957360674
-
Kleptography: Using cryptography against cryptography
-
A. Young and M. Yung. Kleptography: using cryptography against cryptography. In Proc. of Eurocrypt '97, 1997. pp. 62-74.
-
(1997)
Proc. of Eurocrypt '97
, pp. 62-74
-
-
Young, A.1
Yung, M.2
-
25
-
-
84937463317
-
Auto-Recoverable and AutoCertifiable Cryptosystems
-
Advances in Cryptology, Eurocrypt '98, Springer-Verlag
-
A. Young, M. Yung. Auto-Recoverable and AutoCertifiable Cryptosystems. In Advances in Cryptology - Eurocrypt '98, LNCS 1403, Springer-Verlag, 1998. pp. 119-133.
-
(1998)
LNCS
, vol.1403
, pp. 119-133
-
-
Young, A.1
Yung, M.2
|