-
1
-
-
84947770625
-
Dynamic-resharing verifiable secret sharing
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
ALON, N., GALIL, Z., AND YUNG, M. 1995. Dynamic-resharing verifiable secret sharing. In Proceedings of the 3rd Annual European Symposium on Algorithms. Lecture Notes in Computer Science, vol. 979. Springer-Verlag, New York, pp. 523-537.
-
(1995)
Proceedings of the 3rd Annual European Symposium on Algorithms
, vol.979
, pp. 523-537
-
-
Alon, N.1
Galil, Z.2
Yung, M.3
-
2
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction
-
(Edmonton, Alb., Canada, Aug. 14-16). ACM, New York
-
BAR-ILAN, J., AND BEAVER, D. 1989. Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction. In Proceedings of the 8th Annual ACM Symposium on Principles of Distributed Computing (Edmonton, Alb., Canada, Aug. 14-16). ACM, New York, pp. 201-209.
-
(1989)
Proceedings of the 8th Annual ACM Symposium on Principles of Distributed Computing
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
4
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
(Chicago, III, May 2-4). ACM, New York
-
BEN-OR, M., GOLDWASSER, S., AND WIGDERSON, A. 1988. Completeness theorems for noncryptographic fault-tolerant distributed computation. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing (Chicago, III, May 2-4). ACM, New York, pp. 1-10.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
85034837254
-
Secret sharing homomorphisms: Keeping shares of a secret secret
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
BENALOH (COHEN), J. 1987. Secret sharing homomorphisms: keeping shares of a secret secret. In Advances in Cryptology - Crypto '86. Lecture Notes in Computer Science, vol. 263. Springer-Verlag, New York, pp. 251-260.
-
(1987)
Advances in Cryptology - Crypto '86
, vol.263
, pp. 251-260
-
-
Benaloh, J.1
-
6
-
-
84947749920
-
Generating a product of three primes with an unknown factorization
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
BONEH, D., AND HORWITZ, J. 1998. Generating a product of three primes with an unknown factorization. In Proceedings of the 3rd Algorithmic Number Theory Symposium. Lecture Notes in Computer Science, vol. 1423. Springer-Verlag, New York, pp. 237-251.
-
(1998)
Proceedings of the 3rd Algorithmic Number Theory Symposium
, vol.1423
, pp. 237-251
-
-
Boneh, D.1
Horwitz, J.2
-
7
-
-
84948954120
-
Computing inverses over a shared secret modulus
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
CATALANO, D., GENNARO, R., AND HALEVI, S. 2000. Computing inverses over a shared secret modulus. In Advances in Cryptology - Eurocrypt 2000. Lecture Notes in Computer Science, vol. 1807. Springer-Verlag, New York, pp. 196-206.
-
(2000)
Advances in Cryptology - Eurocrypt 2000
, vol.1807
, pp. 196-206
-
-
Catalano, D.1
Gennaro, R.2
Halevi, S.3
-
8
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
(Chicago, 111., May 2-4). ACM, New York
-
CHAUM, D., CRÉPEAU, C., AND DAMGÅRD, I. 1988. Multiparty unconditionally secure protocols. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing (Chicago, 111., May 2-4). ACM, New York, pp. 11-19.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
9
-
-
4243147734
-
Split knowledge generation of RSA parameters
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
COCKS, C. 1997. Split knowledge generation of RSA parameters. In Clyptography and Coding: 6th IMA Conference. Lecture Notes in Computer Science, vol. 1423. Springer-Verlag, New York, pp. 237-251.
-
(1997)
Clyptography and Coding: 6th IMA Conference
, vol.1423
, pp. 237-251
-
-
Cocks, C.1
-
10
-
-
0007414099
-
On the number of uncanceled elements in the sieve of Eratosthenes
-
DE BRUHN, N. 1950. On the number of uncanceled elements in the sieve of Eratosthenes. Proc. Neder. Akad. Wetensch. 53, pp. 803-812. (Reviewed in LeVeque Reviews in Number Theory, 4, N-28, p.221.)
-
(1950)
Proc. Neder. Akad. Wetensch.
, vol.53
, pp. 803-812
-
-
De Bruhn, N.1
-
11
-
-
84857742640
-
-
Reviewed in
-
DE BRUHN, N. 1950. On the number of uncanceled elements in the sieve of Eratosthenes. Proc. Neder. Akad. Wetensch. 53, pp. 803-812. (Reviewed in LeVeque Reviews in Number Theory, 4, N-28, p.221.)
-
LeVeque Reviews in Number Theory
, vol.4
, Issue.28
, pp. 221
-
-
-
12
-
-
0027961556
-
How to share a function securely
-
(Montreal, Que., Canada, May 23-25). ACM, New York
-
DESANTIS, A., DESMEDT, Y., FRANKEL, Y., AND YUNG, M. 1994. How to share a function securely. In Proceedings of the 26th Annual ACM Symposium on Theory of Computing (Montreal, Que., Canada, May 23-25). ACM, New York, pp. 522-533.
-
(1994)
Proceedings of the 26th Annual ACM Symposium on Theory of Computing
, pp. 522-533
-
-
Desantis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
14
-
-
85022187530
-
Shared generation of authenticators and signatures
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
DESMEDT, Y., AND FRANKEL, Y. 1992. Shared generation of authenticators and signatures. In Advances in Cryptology - Crypto '91. Lecture Notes in Computer Science, vol. 576. Springer-Verlag, New York, pp. 457-469.
-
(1992)
Advances in Cryptology - Crypto '91
, vol.576
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
15
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on the discrete logarithm
-
ELGAMAL, T. 1985. A public key cryptosystem and a signature scheme based on the discrete logarithm. IEEE Trans. Inf. Theory 31, 4, 469-472.
-
(1985)
IEEE Trans. Inf. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
16
-
-
0024135240
-
Zero-knowledge proofs of identity
-
FEIGE, U., FIAT, A., AND SHAMIR, A. 1988. Zero-knowledge proofs of identity. J. Crypt. 1, 77-94.
-
(1988)
J. Crypt.
, vol.1
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
17
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
FIAT, A., AND SHAMIR, A. 1987. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology - Crypto '86. Lecture Notes in Computer Science, vol. 263. Springer-Verlag, New York, pp. 186-194.
-
(1987)
Advances in Cryptology - Crypto '86
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
18
-
-
0039241746
-
A practical protocol for large group oriented networks
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
FRANKEL, Y. 1990. A practical protocol for large group oriented networks. In Advances in Cryptology - Eurocrypt '89. Lecture Notes in Computer Science, vol. 434. Springer-Verlag, New York, pp. 56-61.
-
(1990)
Advances in Cryptology - Eurocrypt '89
, vol.434
, pp. 56-61
-
-
Frankel, Y.1
-
19
-
-
0031375570
-
Optimal resilience proactive public key cryptosystems
-
IEEE Computer Society Press, Los Alamitos, Calif
-
FRANKEL, Y., GEMMELL, P., MACKENZIE, P., AND YUNG, M. 1997. Optimal resilience proactive public key cryptosystems. In Proceedings of the 38th Annual IEEE Symposium on Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos, Calif., pp. 384-393.
-
(1997)
Proceedings of the 38th Annual IEEE Symposium on Foundations of Computer Science
, pp. 384-393
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
20
-
-
0031628726
-
Robust efficient distributed RSA-key generation
-
(Dallas, Tex., May 23-26). ACM, New York
-
FRANKEL, Y., MACKENZIE, P., AND YUNG, M. 1998. Robust efficient distributed RSA-key generation. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing (Dallas, Tex., May 23-26). ACM, New York, pp. 663-672.
-
(1998)
Proceedings of the 30th Annual ACM Symposium on Theory of Computing
, pp. 663-672
-
-
Frankel, Y.1
Mackenzie, P.2
Yung, M.3
-
21
-
-
0002992068
-
Joint encryption and message-efficient secure computation
-
FRANKLIN, M., AND HABER, S. 1996. Joint encryption and message-efficient secure computation. J. Crypt. 9, 217-232.
-
(1996)
J. Crypt.
, vol.9
, pp. 217-232
-
-
Franklin, M.1
Haber, S.2
-
23
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
Lecture Notes in Computer Science. pringer-Verlag, New York
-
GENNARO, R., JARECKI, S., KRAWCZYK, H., AND RABIN, T. 1996. Robust and efficient sharing of RSA functions. In Advances in Cryptology - Crypto '96. Lecture Notes in Computer Science, vol. 1109. pringer-Verlag, New York, pp. 157-172.
-
(1996)
Advances in Cryptology - Crypto '96
, vol.1109
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
24
-
-
49049089688
-
Secure distributed key generation for discrete-log based cryptosystems
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
GENNARO, R., JARECKI, S., KRAWCZYK, H., AND RABIN, T. 1999. Secure distributed key generation for discrete-log based cryptosystems. In Advances in Cryptology - Eurocrypt '99. Lecture Notes in Computer Science, vol. 1592. Springer-Verlag, New York, pp. 295-310.
-
(1999)
In Advances in Cryptology - Eurocrypt '99
, vol.1592
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
25
-
-
84957104180
-
Two party RSA key generation
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
GILBOA, N. 1999. Two party RSA key generation. In Advances in Cryptology-Crypto '99. Lecture Notes in Computer Science, vol. 1666. Springer-Verlag, New York, pp. 116-129.
-
(1999)
Advances in Cryptology-crypto '99
, vol.1666
, pp. 116-129
-
-
Gilboa, N.1
-
26
-
-
0023545076
-
How to play any mental game
-
(New York, N.Y., May 25-27). ACM, New York
-
GOLDREICH, O., MICALI, S., AND WIGDERSON, A. 1987. How to play any mental game. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing (New York, N.Y., May 25-27). ACM, New York, pp. 218-229.
-
(1987)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
27
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
GOLDWASSER, S., MICALI, S., AND RACKOFF, C. 1989. The knowledge complexity of interactive proof systems. SIAM J. Comput. 18, 1, 186-208.
-
(1989)
SIAM J. Comput.
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
28
-
-
85034426869
-
Strong primes are easy to find
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
GORDON, J. 1985. Strong primes are easy to find. In Advances in Cryptology - Eurocrypt '84. Lecture Notes in Computer Science, vol. 209. Springer-Verlag, New York, pp. 216-223.
-
(1985)
Advances in Cryptology - Eurocrypt '84
, vol.209
, pp. 216-223
-
-
Gordon, J.1
-
29
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
GUILLOU, L., AND QUISQUATER, J. 1988. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In Advances in Cryptology - Eurocrypt '88. Lecture Notes in Computer Science, vol. 330. Springer-Verlag, New York, pp. 123-128.
-
(1988)
Advances in Cryptology - Eurocrypt '88
, vol.330
, pp. 123-128
-
-
Guillou, L.1
Quisquater, J.2
-
30
-
-
0010390882
-
Experimenting with shared RSA key generation
-
Internet Society, Reston, Va.
-
MALKIN, M., Wu, T., AND BONEH, D. 1999. Experimenting with shared RSA key generation. In proceedings of the Internet Society's 1999 Symposium on Network and Distributed System Security. Internet Society, Reston, Va., pp. 43-56.
-
(1999)
Proceedings of the Internet Society's 1999 Symposium on Network and Distributed System Security
, pp. 43-56
-
-
Malkin, M.1
Wu, T.2
Boneh, D.3
-
31
-
-
84974655726
-
Secure computation
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
MICALI, S., AND ROGAWAY, P. 1992. Secure computation. In Advances in Cryptology - Crypto '91. Lecture Notes in Computer Science, vol. 576. Springer-Verlag, New York, pp. 392-404.
-
(1992)
Advances in Cryptology - Crypto '91
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
32
-
-
85031804925
-
A modification of the Fiat-shamir scheme
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
OHTA, K., AND OKAMOTO, T. 1990. A modification of the Fiat-Shamir scheme. In Advances in Cryptology-Crypto '88. Lecture Notes in Computer Science, vol. 403. Springer-Verlag, New York, pp. 232-243.
-
(1990)
Advances in Cryptology-crypto '88
, vol.403
, pp. 232-243
-
-
Ohta, K.1
Okamoto, T.2
-
33
-
-
33745972475
-
Fast signature generation with a Fiat-Shamir-like scheme
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
ONG, H., AND SCHNORR, C. 1991. Fast signature generation with a Fiat-Shamir-like scheme. In Advances in Cryptology - Eurocrypt '90. Lecture Notes in Computer Science, vol. 473. Springer-Verlag, New York, pp. 432-440.
-
(1991)
Advances in Cryptology - Eurocrypt '90
, vol.473
, pp. 432-440
-
-
Ong, H.1
Schnorr, C.2
-
34
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
PEDERSON, T. 1991. A threshold cryptosystem without a trusted party. In Advances in Cryptology - Eurocrypt 91. Lecture Notes in Computer Science, vol. 547. Springer-Verlag, New York, pp. 522-526.
-
(1991)
Advances in Cryptology - Eurocrypt 91
, vol.547
, pp. 522-526
-
-
Pederson, T.1
-
35
-
-
84947809931
-
Generation of shared RSA keys by two parties
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
POUPARD, G., AND STERN, J. 1998. Generation of shared RSA keys by two parties. In Advances in Cryptology - AsiaCrypt '98. Lecture Notes in Computer Science, vol. 1514. Springer-Verlag, New York, pp. 11-24.
-
(1998)
Advances in Cryptology - AsiaCrypt '98
, vol.1514
, pp. 11-24
-
-
Poupard, G.1
Stern, J.2
-
36
-
-
33845432604
-
Probabilistic algorithm for testing primality
-
RABIN, M. 1980. Probabilistic algorithm for testing primality. J. Num. Theory 12, 128-138.
-
(1980)
J. Num. Theory
, vol.12
, pp. 128-138
-
-
Rabin, M.1
-
37
-
-
84957689308
-
A simplified approach to threshold and proactive RSA
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
RABIN, T. 1998. A simplified approach to threshold and proactive RSA. In Advances in Cryptology - Crypto '98. Lecture Notes in Computer Science, vol. 1462. Springer-Verlag, New York, pp. 89-104.
-
(1998)
In Advances in Cryptology - Crypto '98
, vol.1462
, pp. 89-104
-
-
Rabin, T.1
-
38
-
-
0018545449
-
How to share a secret
-
SHAMIR, A. 1979. How to share a secret. Commun. ACM 22, 11 (Nov.), 612-613.
-
(1979)
Commun. ACM
, vol.22
, Issue.11 NOV.
, pp. 612-613
-
-
Shamir, A.1
-
39
-
-
84948954277
-
Practical threshold signatures
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
SHOUP, V. 2000. Practical threshold signatures. In Advances in Cryptology - Eurocrypt 2000. Lecture Notes in Computer Science, vol. 1807. Springer-Verlag, New York, pp. 207-220.
-
(2000)
Advances in Cryptology - Eurocrypt 2000
, vol.1807
, pp. 207-220
-
-
Shoup, V.1
-
40
-
-
0001873077
-
A fast Monte Carlo test for primality
-
SOLOVAY, R., AND STRASSEN, V. 1977. A fast Monte Carlo test for primality. SIAM J. Comput. 6, 84-85.
-
(1977)
SIAM J. Comput.
, vol.6
, pp. 84-85
-
-
Solovay, R.1
Strassen, V.2
|