-
1
-
-
0036949106
-
Constant-round coin-tossing with a man in the middle or realizing the shared random string model
-
Barak, B.: Constant-round coin-tossing with a man in the middle or realizing the shared random string model. In: FOCS, pp. 345-355 (2002)
-
(2002)
FOCS
, pp. 345-355
-
-
Barak, B.1
-
2
-
-
35048832490
-
An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Bellare, M., Boldyreva, A., Palacio, A.: An uninstantiable random-oracle-model scheme for a hybrid-encryption problem. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 171-188. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
3
-
-
0031334110
-
Does parallel repetition lower the error in computationally sound protocols?
-
Bellare, M., Impagliazzo, R., Naor, M.: Does parallel repetition lower the error in computationally sound protocols? In: FOCS, pp. 374-383 (1997)
-
(1997)
FOCS
, pp. 374-383
-
-
Bellare, M.1
Impagliazzo, R.2
Naor, M.3
-
4
-
-
84949210733
-
-
Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The power of rsa inversion oracles and the security of chaum's rsa-based blind signature scheme. In: Syverson, P.F. (ed.) FC 2001. LNCS, 2339, pp. 319-338. Springer, Heidelberg (2002)
-
Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The power of rsa inversion oracles and the security of chaum's rsa-based blind signature scheme. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 319-338. Springer, Heidelberg (2002)
-
-
-
-
5
-
-
84958775356
-
Transitive signatures based on factoring and rsa
-
Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
-
Bellare, M., Neven, G.: Transitive signatures based on factoring and rsa. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 397-414. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 397-414
-
-
Bellare, M.1
Neven, G.2
-
6
-
-
84937408891
-
Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Bellare, M., Palacio, A.: Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 162-177. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 162-177
-
-
Bellare, M.1
Palacio, A.2
-
7
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Fairfax, pp, ACM, New York
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: First ACM Conference on Computer and Communications Security, Fairfax, pp. 62-73. ACM, New York (1993)
-
(1993)
First ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
0020248370
-
How to generate cryptographically strong sequences of pseudo random bits
-
Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo random bits. In: FOCS, pp. 112-117 (1982)
-
(1982)
FOCS
, pp. 112-117
-
-
Blum, M.1
Micali, S.2
-
10
-
-
55749085358
-
On the security of oaep
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Boldyreva, A., Fischlin, M.: On the security of oaep. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 210-225. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 210-225
-
-
Boldyreva, A.1
Fischlin, M.2
-
11
-
-
84947778144
-
-
Boneh, D.: The decision diffie-hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, 1423, pp. 48-63. Springer, Heidelberg (1998)
-
Boneh, D.: The decision diffie-hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 48-63. Springer, Heidelberg (1998)
-
-
-
-
12
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
13
-
-
84958626314
-
Towards realizing random oracles: Hash functions that hide all partial information
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Canetti, R.: Towards realizing random oracles: Hash functions that hide all partial information. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455-469. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 455-469
-
-
Canetti, R.1
-
14
-
-
4243180376
-
The random oracle methodology, revisited
-
Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. J. ACM 51(4), 557-594 (2004)
-
(2004)
J. ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
15
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
16
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
17
-
-
0343337504
-
Nonmalleable cryptography
-
Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM J. Comput. 30(2), 391-437 (2000)
-
(2000)
SIAM J. Comput
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
18
-
-
0024984004
-
Witness indistinguishable and witness hiding protocols
-
Feige, U., Shamir, A.: Witness indistinguishable and witness hiding protocols. In: STOC, pp. 416-426 (1990)
-
(1990)
STOC
, pp. 416-426
-
-
Feige, U.1
Shamir, A.2
-
20
-
-
0029767165
-
On the composition of zero-knowledge proof systems
-
Goldreich, O., Krawczyk, H.: On the composition of zero-knowledge proof systems. SIAM J. Comput. 25(1), 169-192 (1996)
-
(1996)
SIAM J. Comput
, vol.25
, Issue.1
, pp. 169-192
-
-
Goldreich, O.1
Krawczyk, H.2
-
21
-
-
0344550529
-
On the (in)security of the fiat-shamir paradigm
-
Goldwasser, S., Kalai, Y.T.: On the (in)security of the fiat-shamir paradigm. In: FOCS, p. 102-152 (2003)
-
(2003)
FOCS
, pp. 102-152
-
-
Goldwasser, S.1
Kalai, Y.T.2
-
23
-
-
40249107558
-
-
Lin, H., Pass, R., Venkitasubramaniam, M.: Concurrent non-malleable commitments from any one-way function. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 571-588. Springer, Heidelberg (2008)
-
Lin, H., Pass, R., Venkitasubramaniam, M.: Concurrent non-malleable commitments from any one-way function. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 571-588. Springer, Heidelberg (2008)
-
-
-
-
24
-
-
33745521850
-
-
Malkin, T., Moriarty, R., Yakovenko, N.: Generalized environmental security from number theoretic assumptions. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 343-359. Springer, Heidelberg (2006)
-
Malkin, T., Moriarty, R., Yakovenko, N.: Generalized environmental security from number theoretic assumptions. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 343-359. Springer, Heidelberg (2006)
-
-
-
-
25
-
-
0001448484
-
Bit commitment using pseudorandomness
-
Naor, M.: Bit commitment using pseudorandomness. J. of Cryptology 4 (1991)
-
(1991)
J. of Cryptology
, vol.4
-
-
Naor, M.1
-
27
-
-
35248818856
-
On cryptographic assumptions and challenges
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Naor, M.: On cryptographic assumptions and challenges. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 96-109. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 96-109
-
-
Naor, M.1
-
28
-
-
33748630216
-
Concurrent non-malleable commitments
-
Pass, R., Rosen, A.: Concurrent non-malleable commitments. In: FOCS, pp. 563-572 (2005)
-
(2005)
FOCS
, pp. 563-572
-
-
Pass, R.1
Rosen, A.2
-
29
-
-
34848838622
-
New and improved constructions of non-malleable cryptographic protocols
-
Pass, R., Rosen, A.: New and improved constructions of non-malleable cryptographic protocols. In: STOC, pp. 533-542 (2005)
-
(2005)
STOC
, pp. 533-542
-
-
Pass, R.1
Rosen, A.2
-
30
-
-
38049052188
-
-
Pietrzak, K., Wikström, D.: Parallel repetition of computationally sound protocols revisited. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 86-102. Springer, Heidelberg (2007)
-
Pietrzak, K., Wikström, D.: Parallel repetition of computationally sound protocols revisited. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 86-102. Springer, Heidelberg (2007)
-
-
-
-
31
-
-
4544347480
-
New notions of security: Achieving universal composability without trusted setup
-
Prabhakaran, M., Sahai, A.: New notions of security: achieving universal composability without trusted setup. In: STOC, pp. 242-251 (2004)
-
(2004)
STOC
, pp. 242-251
-
-
Prabhakaran, M.1
Sahai, A.2
-
33
-
-
0033342534
-
Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
-
Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: FOCS, pp. 543-553 (1999)
-
(1999)
FOCS
, pp. 543-553
-
-
Sahai, A.1
|