-
1
-
-
84898960610
-
Completeness Theorems for Noncryp-tographic Fault-Tolerant Distributed Computations
-
ACM Press, New York
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness Theorems for Noncryp-tographic Fault-Tolerant Distributed Computations. In: Proc. 20th STOC, pp. 1-10. ACM Press, New York (1988)
-
(1988)
Proc. 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
0002181960
-
Digital Multisignatures
-
Baker, H, Piper, F, eds, Claredon Press, Oxford
-
Boyd, C.: Digital Multisignatures. In: Baker, H., Piper, F. (eds.) Cryptography and Coding, pp. 241-246. Claredon Press, Oxford (1989)
-
(1989)
Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
5
-
-
0003200675
-
Public-key cryptography and re-usable shared secrets
-
Baker, H, Piper, F, eds, Claredon Press, Oxford
-
Croft, R.A., Harris, S.P.: Public-key cryptography and re-usable shared secrets. In: Baker, H., Piper, F. (eds.) Cryptography and Coding, pp. 189-201. Claredon Press, Oxford (1989)
-
(1989)
Cryptography and Coding
, pp. 189-201
-
-
Croft, R.A.1
Harris, S.P.2
-
6
-
-
0027580298
-
Efficient and secure multiparty generation of digital signatures based on discrete logarithms
-
Cerecedo, M., Matsumoto, T., Imai, H.: Efficient and secure multiparty generation of digital signatures based on discrete logarithms. IEICE Trans. Fundamentals E76-A(4), 532-545 (1993)
-
(1993)
IEICE Trans. Fundamentals
, vol.E76-A
, Issue.4
, pp. 532-545
-
-
Cerecedo, M.1
Matsumoto, T.2
Imai, H.3
-
7
-
-
84921068281
-
On the Exact Security of Full Domain Hash
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Coron, J.-S.: On the Exact Security of Full Domain Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229-235. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 229-235
-
-
Coron, J.-S.1
-
8
-
-
0027961556
-
How to share a function securely
-
ACM Press, New York
-
De Santis, A., Desmedt, Y., Frankel, Y., Yung, M.: How to share a function securely. In: Proc. 26th STOC, pp. 522-533. ACM Press, New York (1994)
-
(1994)
Proc. 26th STOC
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
9
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
-
Desmedt, Y.: Society and group oriented cryptography: A new concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120-127. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 120-127
-
-
Desmedt, Y.1
-
11
-
-
85022187530
-
Shared generation of authenticators and signatures
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457-469. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
12
-
-
44449121147
-
-
Personal Communication September
-
Fazio, N.: Personal Communication (September 2007)
-
(2007)
-
-
Fazio, N.1
-
13
-
-
84958676203
-
Proactive RSA
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Frankel, Y., Gemmell, P., Mackenzie, P., Yung, M.: Proactive RSA. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 440-454. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 440-454
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
14
-
-
0029713931
-
Witness-based Cryptographic Program Checking and Robust Function Sharing
-
ACM Press, New York
-
Frankel, Y., Gemmell, P., Yung, M.: Witness-based Cryptographic Program Checking and Robust Function Sharing. In: Proc. 28th STOC, pp. 499-508. ACM Press, New York (1996)
-
(1996)
Proc. 28th STOC
, pp. 499-508
-
-
Frankel, Y.1
Gemmell, P.2
Yung, M.3
-
15
-
-
44449147322
-
-
Full version
-
Gennaro, R., Halevi, S., Krawczyk, H., Rabin, T.: Threshold RSA for Dynamic and Ad-Hoc Groups. Full version, http://eprint.iacr.org/2008/045
-
Threshold RSA for Dynamic and Ad-Hoc Groups
-
-
Gennaro, R.1
Halevi, S.2
Krawczyk, H.3
Rabin, T.4
-
16
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust and efficient sharing of RSA functions. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 157-172. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
17
-
-
0035835293
-
-
Information and Computation , Extended abstract in EUROCRYPT 1996
-
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust Threshold DSS Signatures. Information and Computation 164(1), 54-84 (2001); Extended abstract in EUROCRYPT 1996
-
(2001)
Robust Threshold DSS Signatures
, vol.164
, Issue.1
, pp. 54-84
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
18
-
-
84958670348
-
RSA-based Undeniable Signatures
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Gennaro, R., Krawczyk, H., Rabin, T.: RSA-based Undeniable Signatures. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 397-416. Springer, Heidelberg (1997);
-
(1997)
LNCS
, vol.1294
, pp. 397-416
-
-
Gennaro, R.1
Krawczyk, H.2
Rabin, T.3
-
19
-
-
0012081094
-
-
Final version in J. Cryptology 13(4), 397-416 (2000)
-
Final version in J. Cryptology 13(4), 397-416 (2000)
-
-
-
-
20
-
-
0038425881
-
-
Gennaro, R., Krawczyk, H., Rabin, T.: Robust and Efficient Sharing of RSA Functions. Journal of Cryptology 13(2), 273-300 (2000); Conference version [16]
-
Gennaro, R., Krawczyk, H., Rabin, T.: Robust and Efficient Sharing of RSA Functions. Journal of Cryptology 13(2), 273-300 (2000); Conference version [16]
-
-
-
-
21
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Computing 17(2), 281-308 (1988)
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
22
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communication of the ACM 21(2), 120-126 (1978)
-
(1978)
Communication of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
23
-
-
0018545449
-
How to Share a Secret
-
Shamir, A.: How to Share a Secret. Communications of the ACM 22, 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
24
-
-
38049015677
-
On the Generation of Cryptographically Strong Pseudorandom Sequences
-
Shamir, A.: On the Generation of Cryptographically Strong Pseudorandom Sequences. ACM Trans. Comput. Syst. 1(1), 38-44 (1983)
-
(1983)
ACM Trans. Comput. Syst
, vol.1
, Issue.1
, pp. 38-44
-
-
Shamir, A.1
-
25
-
-
84948954277
-
Practical threshold signatures
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207-220. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 207-220
-
-
Shoup, V.1
-
26
-
-
33750959755
-
Efficient node admission for short-lived mobile ad hoc networks
-
Saxena, N., Tsudik, G., Yi, J.H.: Efficient node admission for short-lived mobile ad hoc networks. In: ICNP, 13th IEEE International Conference on Network Protocols, pp. 269-278 (2005)
-
(2005)
ICNP, 13th IEEE International Conference on Network Protocols
, pp. 269-278
-
-
Saxena, N.1
Tsudik, G.2
Yi, J.H.3
|