-
1
-
-
84955579478
-
The Newton channel
-
Anderson, R.J, ed, Information Hiding, Springer, Heidelberg
-
Anderson, R.J., Vaudenay, S., Preneel, B., Nyberg, K.: The Newton channel. In: Anderson, R.J. (ed.) Information Hiding. LNCS, vol. 1174, pp. 151-156. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1174
, pp. 151-156
-
-
Anderson, R.J.1
Vaudenay, S.2
Preneel, B.3
Nyberg, K.4
-
2
-
-
0346179738
-
-
preliminary version, May 10
-
Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable encryption (preliminary version) (May 10, 1996)
-
(1996)
Deniable encryption
-
-
Canetti, R.1
Dwork, C.2
Naor, M.3
Ostrovsky, R.4
-
3
-
-
84958626761
-
Deniable encryption
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable encryption. In: Kaliski Jr, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90-104. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 90-104
-
-
Canetti, R.1
Dwork, C.2
Naor, M.3
Ostrovsky, R.4
-
4
-
-
0030416397
-
Incoercible multiparty computation (extended abstract). In: FOCS
-
Soc, Los Alamitos
-
Canetti, R., Gennaro, R.: Incoercible multiparty computation (extended abstract). In: FOCS, pp. 504-513. IEEE Comp. Soc, Los Alamitos (1996)
-
(1996)
IEEE Comp
, pp. 504-513
-
-
Canetti, R.1
Gennaro, R.2
-
5
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Blakely, C.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, C.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 10-18
-
-
ElGamal, T.1
-
6
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469-472 (1985)
-
(1985)
IEEE Trans. Inf. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
7
-
-
84937393537
-
-
Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystemsconversions for McEliece PKC In: Kim, K.-c. (ed.) PKC 2001. LNCS, 1992, pp. 19-35. Springer, Heidelberg (2001)
-
Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystemsconversions for McEliece PKC In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 19-35. Springer, Heidelberg (2001)
-
-
-
-
9
-
-
35048902569
-
A public-key encryption scheme with pseudo-random ciphertexts
-
Samarati, P, Ryan, P.Y.A, Gollmann, D, Molva, R, eds, ESORICS 2004, Springer, Heidelberg
-
Möller, B.: A public-key encryption scheme with pseudo-random ciphertexts. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 335-351. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3193
, pp. 335-351
-
-
Möller, B.1
-
10
-
-
79960836060
-
Deniable ring authentication
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Naor, M.: Deniable ring authentication. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 481-498. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 481-498
-
-
Naor, M.1
-
11
-
-
4243063326
-
-
Doctoral Thesis, Royal Institute of Technology, Department of Numerical Analysis and Computing Science, Stockholm August
-
Näslund, M.: Bit Extraction, Hard-Core Predicates, and the Bit Security of RSA. Doctoral Thesis, Royal Institute of Technology, Department of Numerical Analysis and Computing Science, Stockholm (August 1998)
-
(1998)
Bit Extraction, Hard-Core Predicates, and the Bit Security of RSA
-
-
Näslund, M.1
-
12
-
-
84957360674
-
Kleptography: Using cryptography against cryptography
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Young, A., Yung, M.: Kleptography: Using cryptography against cryptography. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 62-74. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 62-74
-
-
Young, A.1
Yung, M.2
-
13
-
-
24144478261
-
-
Young, A., Yung, M.: Malicious cryptography: Kleptographic aspects. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, 3376, pp. 7-18. Springer, Heidelberg (2005)
-
Young, A., Yung, M.: Malicious cryptography: Kleptographic aspects. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 7-18. Springer, Heidelberg (2005)
-
-
-
-
14
-
-
33745596392
-
-
Young, A., Yung, M.: A space efficient backdoor in RSA and its applications. In: Preneel, B., Tavares, S.E. (eds.) SAC 2005. LNCS, 3897, pp. 128-143. Springer, Heidelberg (2006)
-
Young, A., Yung, M.: A space efficient backdoor in RSA and its applications. In: Preneel, B., Tavares, S.E. (eds.) SAC 2005. LNCS, vol. 3897, pp. 128-143. Springer, Heidelberg (2006)
-
-
-
|