-
1
-
-
84946837370
-
-
Advances in Cryptology, ASIACRYPT, ed, Lect. Notes Comput. Sci, Springer
-
M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval, Key-Privacy in Public-Key Encryption., Advances in Cryptology - ASIACRYPT 2001 (C. Boyd, ed.), Lect. Notes Comput. Sci., vol. 2248, Springer, 2001, pp. 566-582.
-
(2001)
Key-Privacy in Public-Key Encryption
, vol.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
2
-
-
30744457437
-
-
M. Bellare and T. Kohno, Hash Function Balance and its Impact on Birthday Attacks., Advances in Cryptology - EUROCRYPT 2004 (C. Cachin and J. Camenisch, eds.), Lect. Notes Comput. Sci., 3027, Springer, 2004, pp. 401-418.
-
M. Bellare and T. Kohno, Hash Function Balance and its Impact on Birthday Attacks., Advances in Cryptology - EUROCRYPT 2004 (C. Cachin and J. Camenisch, eds.), Lect. Notes Comput. Sci., vol. 3027, Springer, 2004, pp. 401-418.
-
-
-
-
3
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Design-ing Efficient Protocols
-
D. Denning, R. Pyle, R. Ganesan, R. Sandhu, and V. Ashby, eds, ACM Press
-
M. Bellare and P. Rogaway, Random Oracles are Practical: A Paradigm for Design-ing Efficient Protocols., Proceedings of the First ACM Conference on Computer and Communications Security (D. Denning, R. Pyle, R. Ganesan, R. Sandhu, and V. Ashby, eds.), ACM Press, 1993, pp. 62-73.
-
(1993)
Proceedings of the First ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84958769452
-
-
J. Boyar, D. Chaum, I. B. Damgård, and T. B. Pedersen, Convertible undeniable signatures., Advances in Cryptology - CRYPTO'90 (A. J. Menezes and S. A. Vanstone, eds.), Lect. Notes Comput. Sci., 537, Springer, 1991, pp. 189-205.
-
J. Boyar, D. Chaum, I. B. Damgård, and T. B. Pedersen, Convertible undeniable signatures., Advances in Cryptology - CRYPTO'90 (A. J. Menezes and S. A. Vanstone, eds.), Lect. Notes Comput. Sci., vol. 537, Springer, 1991, pp. 189-205.
-
-
-
-
5
-
-
14844342644
-
-
Des. Codes Cryptography 35
-
D. R. L. Brown, Generic Groups, Collision Resistance, and ECDSA., Des. Codes Cryptography 35 (2005), no. 1, 119-152.
-
(2005)
Generic Groups, Collision Resistance, and ECDSA
, Issue.1
, pp. 119-152
-
-
Brown, D.R.L.1
-
6
-
-
35248847060
-
-
Advances in Cryptology, CRYPTO, ed, Lect. Notes Comput. Sci, Springer
-
J. Camenisch and V. Shoup, Practical Verifiable Encryption and Decryption of Discrete Logarithms., Advances in Cryptology - CRYPTO 2003 (D. Boneh, ed.), Lect. Notes Comput. Sci., vol. 2729, Springer, 2003, pp. 126-144.
-
(2003)
Practical Verifiable Encryption and Decryption of Discrete Logarithms
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
7
-
-
38049082813
-
-
D. Chaum and H. van Antwerpen, Undeniable Signatures., Advances in Cryptology - CRYPTO'89 (G. Brassard, ed.), Lect. Notes Comput. Sci., 435, Springer, 1990, pp. 212-216.
-
D. Chaum and H. van Antwerpen, Undeniable Signatures., Advances in Cryptology - CRYPTO'89 (G. Brassard, ed.), Lect. Notes Comput. Sci., vol. 435, Springer, 1990, pp. 212-216.
-
-
-
-
8
-
-
84958745695
-
-
Advances in Cryptology, ASIACRYPT, ed, Lect. Notes Comput. Sci, Springer
-
A. W. Dent, Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model, Advances in Cryptology - ASIACRYPT 2002 (Y. Zheng, ed.), Lect. Notes Comput. Sci., vol. 2501, Springer, 2002, pp. 100-109.
-
(2002)
Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model
, vol.2501
, pp. 100-109
-
-
Dent, A.W.1
-
9
-
-
35248865251
-
-
Topics in Cryptology, CT-RSA, ed, Lect. Notes Comput. Sci, Springer
-
S. D. Galbraith and W. Mao, Invisibility and Anonymity of Undeniable and Confirmer Signatures., Topics in Cryptology - CT-RSA 2003 (M. Joye, ed.), Lect. Notes Comput. Sci., vol. 2612, Springer, 2003, pp. 80-97.
-
(2003)
Invisibility and Anonymity of Undeniable and Confirmer Signatures
, vol.2612
, pp. 80-97
-
-
Galbraith, S.D.1
Mao, W.2
-
10
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
S. Goldwasser, S. Micali, and R. L. Rivest, A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks., SIAM J. Comput. 17 (1988), no. 2, 281-308.
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
11
-
-
84927752554
-
-
M. Jakobsson, K. Sako, and R. Impagliazzo, Designated Verifier Proofs and Their Applications., Advances in Cryptology - EUROCRYPT'96 (U. M. Maurer, ed.), Lect. Notes Comput. Sci., 1070, Springer, 1996, pp. 143-154.
-
M. Jakobsson, K. Sako, and R. Impagliazzo, Designated Verifier Proofs and Their Applications., Advances in Cryptology - EUROCRYPT'96 (U. M. Maurer, ed.), Lect. Notes Comput. Sci., vol. 1070, Springer, 1996, pp. 143-154.
-
-
-
-
12
-
-
33646826706
-
-
C. Kudla and K. G. Paterson, Non-interactive Designated Verifier Proofs and Undeniable Signatures., Cryptography and Coding, 10th IMA International Conference (N. P. Smart, ed.), Lect. Notes Comput. Sci., 3796, Springer, 2005, pp. 136-154.
-
C. Kudla and K. G. Paterson, Non-interactive Designated Verifier Proofs and Undeniable Signatures., Cryptography and Coding, 10th IMA International Conference (N. P. Smart, ed.), Lect. Notes Comput. Sci., vol. 3796, Springer, 2005, pp. 136-154.
-
-
-
-
13
-
-
24144458509
-
-
F. Laguillaumie and D. Vergnaud, Time-Selective Convertible Undeniable Signatures., Topics in Cryptology - CT-RSA 2005 (A. J. Menezes, ed.), Lect. Notes Comput. Sci., 3376, Springer, 2005, pp. 154-171.
-
F. Laguillaumie and D. Vergnaud, Time-Selective Convertible Undeniable Signatures., Topics in Cryptology - CT-RSA 2005 (A. J. Menezes, ed.), Lect. Notes Comput. Sci., vol. 3376, Springer, 2005, pp. 154-171.
-
-
-
-
14
-
-
0029722956
-
Breaking and Repairing a Convertible Undeniable Signature Scheme
-
L. Gong and J. Stern, eds, ACM Press
-
M. Michels, H. Petersen, and P. Horster, Breaking and Repairing a Convertible Undeniable Signature Scheme., Proceedings of the Third ACM Conference on Computer and Communications Security (L. Gong and J. Stern, eds.), ACM Press, 1996, pp. 148-152.
-
(1996)
Proceedings of the Third ACM Conference on Computer and Communications Security
, pp. 148-152
-
-
Michels, M.1
Petersen, H.2
Horster, P.3
-
15
-
-
33646031793
-
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme
-
W. Ogata, K. Kurosawa, and S.-H. Heng, The Security of the FDH Variant of Chaum's Undeniable Signature Scheme, IEEE Trans. Inf. Theory 52 (2006), no. 5, 2006-2017.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.5
, pp. 2006-2017
-
-
Ogata, W.1
Kurosawa, K.2
Heng, S.-H.3
-
16
-
-
84937389342
-
-
ed, Lect. Notes Comput. Sci, Springer
-
T. Okamoto and D. Pointcheval, The Gap-Problems: a New Class of Problems for the Security of Cryptographic Schemes., 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001 (K. Kim, ed.), Lect. Notes Comput. Sci., vol. 1992, Springer, 2001, pp. 104-118.
-
(2001)
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC
, vol.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
17
-
-
33646784002
-
-
Advances in Cryptology, ASIACRYPT, ed, Lect. Notes Comput. Sci, Springer
-
P. Paillier and D. Vergnaud, Discrete-Log Based Signatures May Not Be Equivalent to Discrete-Log., Advances in Cryptology - ASIACRYPT 2005 (B. Roy, ed.), Lect. Notes Comput. Sci., vol. 3788, Springer, 2005, pp. 1-20.
-
(2005)
Discrete-Log Based Signatures May Not Be Equivalent to Discrete-Log
, vol.3788
, pp. 1-20
-
-
Paillier, P.1
Vergnaud, D.2
-
18
-
-
35048855067
-
-
P. Rogaway and T. Shrimpton, Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance., Fast Software Encryption, 11th International Workshop, FSE 2004 (B. K. Roy and W. Meier, eds.), Lect. Notes Comput. Sci., 3017, Springer, 2004, pp. 371-388.
-
P. Rogaway and T. Shrimpton, Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance., Fast Software Encryption, 11th International Workshop, FSE 2004 (B. K. Roy and W. Meier, eds.), Lect. Notes Comput. Sci., vol. 3017, Springer, 2004, pp. 371-388.
-
-
-
-
19
-
-
84942550160
-
-
Advances in Cryptology, EUROCRYPT'97, ed, Lect. Notes Comput. Sci, Springer
-
V. Shoup, Lower Bounds for Discrete Logarithms and Related Problems., Advances in Cryptology - EUROCRYPT'97 (W. Fumy, ed.), Lect. Notes Comput. Sci., vol. 1233, Springer, 1997, pp. 256-266.
-
(1997)
Lower Bounds for Discrete Logarithms and Related Problems
, vol.1233
, pp. 256-266
-
-
Shoup, V.1
-
20
-
-
0036025702
-
The Residues modulo m of Products of Random Integers
-
W. Stadje, The Residues modulo m of Products of Random Integers., Comb. Probab. Comput. 11 (2002), no. 5, 529-540.
-
(2002)
Comb. Probab. Comput
, vol.11
, Issue.5
, pp. 529-540
-
-
Stadje, W.1
-
21
-
-
84937411969
-
-
Advances in Cryptology, CRYPTO, ed, Lect. Notes Comput. Sci, Springer
-
J. Stern, D. Pointcheval, J. Malone-Lee, and N. P. Smart, Flaws in applying proof methodologies to signature schemes., Advances in Cryptology - CRYPTO 2002 (M. Yung, ed.), Lect. Notes Comput. Sci., vol. 2442, Springer, 2002, pp. 93-110.
-
(2002)
Flaws in applying proof methodologies to signature schemes
, vol.2442
, pp. 93-110
-
-
Stern, J.1
Pointcheval, D.2
Malone-Lee, J.3
Smart, N.P.4
|