-
3
-
-
56449120602
-
-
Schneier, B.: Applied cryptography: protocols, algorithms, and source code in C, 2nd edn. John Wiley & Sons, Inc., New York (1995)
-
Schneier, B.: Applied cryptography: protocols, algorithms, and source code in C, 2nd edn. John Wiley & Sons, Inc., New York (1995)
-
-
-
-
4
-
-
0345757358
-
Practical Byzantine fault tolerance and proactive recovery
-
Castro, M., Liskov, B.: Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20(4), 398-461 (2002)
-
(2002)
ACM Trans. Comput. Syst
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
5
-
-
85009705400
-
-
Cowling, J., Myers, D., Liskov, B., Rodrigues, R., Shrira, L.: HQ replication: A hybrid quorum protocol for Byzantine fault tolerance. In: Proc. 7th OSDI (November 2006)
-
Cowling, J., Myers, D., Liskov, B., Rodrigues, R., Shrira, L.: HQ replication: A hybrid quorum protocol for Byzantine fault tolerance. In: Proc. 7th OSDI (November 2006)
-
-
-
-
6
-
-
70450015331
-
Zyzzyva: Speculative byzantine fault tolerance
-
Kotla, R., Alvisi, L., Dahlin, M., Clement, A., Wong, E.: Zyzzyva: Speculative byzantine fault tolerance. In: Proc. 21st SOSP (2007)
-
(2007)
Proc. 21st SOSP
-
-
Kotla, R.1
Alvisi, L.2
Dahlin, M.3
Clement, A.4
Wong, E.5
-
7
-
-
0023399690
-
Simulating authenticated broadcasts to derive simple fault-tolerant algorithms
-
Srikanth, T.K., Toueg, S.: Simulating authenticated broadcasts to derive simple fault-tolerant algorithms. Distributed Computing 2(2), 80-94 (1987)
-
(1987)
Distributed Computing
, vol.2
, Issue.2
, pp. 80-94
-
-
Srikanth, T.K.1
Toueg, S.2
-
8
-
-
41149103397
-
Zyzzyva: Speculative byzantine fault tolerance
-
Technical Report TR-07-40, University of Texas at Austin
-
Kotla, R., Alvisi, L., Dahlin, M., Clement, A., Wong, E.: Zyzzyva: Speculative byzantine fault tolerance. Technical Report TR-07-40, University of Texas at Austin (2007)
-
(2007)
-
-
Kotla, R.1
Alvisi, L.2
Dahlin, M.3
Clement, A.4
Wong, E.5
-
10
-
-
56449120359
-
-
Aiyer, A., Alvisi, L., Bazzi, R.A.: Bounded wait-free implementation of optimally resilient byzantine storage without (unproven) cryptographic assumptions. In: Pelc, A. (ed.) DISC 2007. LNCS, 4731, pp. 443-458. Springer, Heidelberg (2007)
-
Aiyer, A., Alvisi, L., Bazzi, R.A.: Bounded wait-free implementation of optimally resilient byzantine storage without (unproven) cryptographic assumptions. In: Pelc, A. (ed.) DISC 2007. LNCS, vol. 4731, pp. 443-458. Springer, Heidelberg (2007)
-
-
-
-
11
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans, on Info Theory 22(6), 644-654 (1976)
-
(1976)
IEEE Trans, on Info Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
12
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120-126 (1978)
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
13
-
-
84937409531
-
Unconditionally secure digital signature schemes admitting transferability
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
-
Hanaoka, G., Shikata, J., Zheng, Y., Imai, H.: Unconditionally secure digital signature schemes admitting transferability. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 130-142. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 130-142
-
-
Hanaoka, G.1
Shikata, J.2
Zheng, Y.3
Imai, H.4
-
15
-
-
84976699318
-
The byzantine generals problem
-
Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382-401 (1982)
-
(1982)
ACM Trans. Program. Lang. Syst
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
16
-
-
56449107879
-
Matrix signatures: From macs to digital signatures
-
Technical Report TR-08-09, University of Texas at Austin, Department of Computer Sciences February
-
Aiyer, A.S., Lorenzo Alvisi, R.A.B., Clement, A.: Matrix signatures: From macs to digital signatures. Technical Report TR-08-09, University of Texas at Austin, Department of Computer Sciences (February 2008)
-
(2008)
-
-
Aiyer, A.S.1
Lorenzo Alvisi, R.A.B.2
Clement, A.3
-
17
-
-
84976810569
-
Reaching agreement in the presence of faults
-
Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. J. ACM 27(2), 228-234 (1980)
-
(1980)
J. ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
|