-
1
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
and, In, pages
-
Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone Lee, Gregory Neven, Pascal Paillier, and Haixia Shi. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In Advances in Cryptology-CRYPTO 2005, pages 205-22, 2005.
-
(2005)
Advances in Cryptology-CRYPTO 2005
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Lee, J.M.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
85032877753
-
Non-interactive oblivious transfer and applications
-
pages
-
Mihir Bellare and Silvio Micali. Non-interactive oblivious transfer and applications. In Advances in Cryptology-CRYPTO 1989, pages 547-57, 1989.
-
(1989)
Advances in Cryptology-CRYPTO 1989
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
3
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
and, In, pages
-
Mihir Bellare, David Pointcheval, and Philip Rogaway. Authenticated key exchange secure against dictionary attacks. In Advances in Cryptology-EUROCRYPT 2000, pages 139-55, 2000.
-
(2000)
Advances in Cryptology-EUROCRYPT 2000
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
pages
-
Steven M. Bellovin and Michael Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In IEEE Symposium on Security and Privacy-SP 1992, pages 72-84, 1992.
-
(1992)
IEEE Symposium on Security and Privacy-SP 1992
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
6
-
-
84969361843
-
Practical quantum oblivious transfer
-
and, In, pages
-
Charles H. Bennett, Gilles Brassard, Claude Crépeau, and M.-H. Skubiszewska. Practical quantum oblivious transfer. In Advances in Cryptology-CRYPTO 1991, pages 351-66, 1991.
-
(1991)
Advances in Cryptology-CRYPTO 1991
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, M.-H.4
-
7
-
-
34547358080
-
Advances in elliptic curve cryptography
-
Ian F. Blake, Gadiel Seroussi, and Nigel P. Smart, editors, of, Cambridge University Press
-
Ian F. Blake, Gadiel Seroussi, and Nigel P. Smart, editors. Advances in Elliptic Curve Cryptography, volume 317 of London Mathematical Society Lecture Note Series. Cambridge University Press, 2005.
-
(2005)
London Mathematical Society Lecture Note Series
, vol.317
-
-
-
8
-
-
84949230533
-
Key agreement protocols and their security analysis
-
and, In, pages
-
Simon Blake-Wilson, Don Johnson, and Alfred Menezes. Key agreement protocols and their security analysis. In Proceedings of the Sixth IMA International Conference on Cryptography and Coding, pages 30-45, 1997.
-
(1997)
Proceedings of the Sixth IMA International Conference on Cryptography and Coding
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
9
-
-
35248880074
-
Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme
-
pages
-
Alexandra Boldyreva. Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In Public Key Cryptography-PKC 2003, pages 31-46, 2003.
-
(2003)
Public Key Cryptography-PKC 2003
, pp. 31-46
-
-
Boldyreva, A.1
-
10
-
-
35048901123
-
Public key encryption with keyword search
-
and, In, pages
-
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public key encryption with keyword search. In Advances in Cryptology-EUROCRYPT 2004, pages 506-22, 2004.
-
(2004)
Advances in Cryptology-EUROCRYPT 2004
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
11
-
-
38049138213
-
Public key encryption that allows pir queries
-
and, In, pages
-
Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, and W. Skeith. Public key encryption that allows PIR queries. In Advances in Cryptology-CRYPTO 2007, pages 50-67, 2007.
-
(2007)
Advances in Cryptology-CRYPTO 2007
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith, W.4
-
12
-
-
84946840347
-
Short signatures from the weil pairing
-
Advances in Cryptology - ASIACRYPT 2001
-
Dan Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the Weil pairing. In Advances in Cryptology-ASIACRYPT 2001, pages 514-32, 2001. (Pubitemid 33371204)
-
(2002)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
13
-
-
85071440512
-
Halting password puzzles - Hard-to-break encryption from human-memorable keys
-
pages, The USENIX Association
-
Xavier Boyen. Halting password puzzles - hard-to-break encryption from human-memorable keys. In 16th USENIX Security Symposium-SECURITY 2007, pages 119-134. The USENIX Association, 2007.
-
(2007)
16th USENIX Security Symposium-SECURITY 2007
, pp. 119-134
-
-
Boyen, X.1
-
16
-
-
84888252697
-
All-or-nothing disclosure of secrets
-
and, In, pages
-
Gilles Brassard, Claude Crépeau, and Jean-Marc Robert. All-or-nothing disclosure of secrets. In Advances in Cryptology-CRYPTO 1986, pages 234-38, 1986.
-
(1986)
Advances in Cryptology-CRYPTO 1986
, pp. 234-238
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.3
-
17
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
and, In, pages
-
Christian Cachin, Silvio Micali, and Michael Stadler. Computationally private information retrieval with polylogarithmic communication. In Advances in Cryptology-EUROCRYPT 1999, pages 402-14, 1999.
-
(1999)
Advances in Cryptology-EUROCRYPT 1999
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
18
-
-
38049132285
-
Simulatable adaptive oblivious transfer
-
and, In, pages
-
Jan Camenisch, Gregory Neven, and abhi shelat. Simulatable adaptive oblivious transfer. In Advances in Cryptology-EUROCRYPT 2007, pages 573-90, 2007.
-
(2007)
Advances in Cryptology-EUROCRYPT 2007
, pp. 573-590
-
-
Camenisch, J.1
Neven, G.2
Shelat, A.3
-
19
-
-
24944566824
-
Universally composable password-based key exchange
-
and, In, pages
-
Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, and Philip MacKenzie. Universally composable password-based key exchange. In Advances in Cryptology-EUROCRYPT 2005, pages 404-21, 2005.
-
(2005)
Advances in Cryptology-EUROCRYPT 2005
, pp. 404-421
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
Lindell, Y.4
MacKenzie, P.5
-
20
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
pages
-
Ran Canetti and Hugo Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology-EUROCRYPT 2001, pages 453-74, 2001.
-
(2001)
Advances in Cryptology-EUROCRYPT 2001
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
21
-
-
0020915882
-
Blind signatures for untraceable payments
-
pages 199-203
-
David Chaum. Blind signatures for untraceable payments. In Advances in Cryptology-CRYPTO 1982, pages 199-203, 1982.
-
(1982)
Advances in Cryptology-CRYPTO 1982
-
-
Chaum, D.1
-
22
-
-
0029541045
-
Private information retrieval
-
and, In, pages
-
Benny Chor, Oded Goldreich, Eyal Kushilevitz, and Madhu Sudan. Private information retrieval. In IEEE Symposium on Foundations of Computer Science-FOCS 1995, pages 41-51, 1995.
-
(1995)
IEEE Symposium on Foundations of Computer Science-FOCS 1995
, pp. 41-51
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
24
-
-
0020878801
-
A randomized protocol for signing contracts
-
and, In, pages
-
Shimon Even, Oded Goldreich, and Abraham Lempel. A randomized protocol for signing contracts. In Advances in Cryptology-CRYPTO 1982, pages 205-10, 1982.
-
(1982)
Advances in Cryptology-CRYPTO 1982
, pp. 205-210
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
25
-
-
39049162527
-
Klassp: Entering passwords on a spyware infected machine using a shared-secret proxy
-
D. Florencio and Cormac Herley. Klassp: Entering passwords on a spyware infected machine using a shared-secret proxy. In Proc. ACSAC 2006, 2006.
-
(2006)
Proc. ACSAC 2006
-
-
Florencio, D.1
Herley, C.2
-
28
-
-
33745793866
-
Password authenticated key exchange using hidden smooth subgroups
-
and, In, pages 299-309, ACM Press
-
Craig Gentry, Philip MacKenzie, and Zulfikar Ramzan. Password authenticated key exchange using hidden smooth subgroups. In ACM Conference on Computer and Communications Security-CCS 2005, pages 299-309. ACM Press, 2005.
-
(2005)
ACM Conference on Computer and Communications Security-CCS 2005
-
-
Gentry, C.1
MacKenzie, P.2
Ramzan, Z.3
-
29
-
-
33749542277
-
A method for making password-based key exchange resilient to server compromise
-
and, In, LNCS, pages, Springer-Verlag
-
Craig Gentry, Philip MacKenzie, and Zulfikar Ramzan. A method for making password-based key exchange resilient to server compromise. In Advances in Cryptology-CRYPTO 2006, LNCS, pages 142-59. Springer-Verlag, 2006.
-
(2006)
Advances in Cryptology-CRYPTO 2006
, pp. 142-159
-
-
Gentry, C.1
MacKenzie, P.2
Ramzan, Z.3
-
30
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
and, In, pages
-
Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In ACM Symposium on Theory of Computing-STOC 1987, pages 218-29, 1987.
-
(1987)
ACM Symposium on Theory of Computing-STOC 1987
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
32
-
-
73849106067
-
Smooth projective hashing and two-message oblivious transfer
-
Report 2007/118
-
Shai Halevi and Yael Tauman Kalai. Smooth projective hashing and two-message oblivious transfer. Cryptology ePrint Archive, Report 2007/118, 2007.
-
(2007)
Cryptology EPrint Archive
-
-
Halevi, S.1
Kalai, Y.T.2
-
36
-
-
23044527599
-
Efficient password-authenticated key exchange using human-memorable passwords
-
and, In
-
Jonathan Katz, Rafail Ostrovsky, and Moti Yung. Efficient password-authenticated key exchange using human-memorable passwords. In Advances in Cryptology-CRYPTO 2001, 2001.
-
(2001)
Advances in Cryptology-CRYPTO 2001
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
38
-
-
1942420748
-
Oblivious keyword search
-
Kaoru Kurosawa and W. Ogata. Oblivious keyword search. Journal of Complexity, 20 (2-3):356-71, 2004.
-
(2004)
Journal of Complexity
, vol.20
, Issue.2-3
, pp. 356-371
-
-
Kurosawa, K.1
Ogata, W.2
-
39
-
-
26444579536
-
An oblivious transfer protocol with log-squared communication
-
Report 2004/063
-
Helger Lipmaa. An oblivious transfer protocol with log-squared communication. Cryptology ePrint Archive, Report 2004/063, 2004.
-
(2004)
Cryptology EPrint Archive
-
-
Lipmaa, H.1
-
42
-
-
77952369980
-
-
Andreas Pashalidis
-
Andreas Pashalidis. http://www.kyps.net, 2007.
-
(2007)
-
-
-
43
-
-
18144416530
-
Mitchell. Impostor: A single sign-on system for use from untrusted devices
-
Andreas Pashalidis and Chris J. Mitchell. Impostor: a single sign-on system for use from untrusted devices. In Proc. IEEE Globecom 2004, 2004.
-
(2004)
Proc. IEEE Globecom 2004
-
-
Pashalidis, A.1
Chris, J.2
-
44
-
-
0003462641
-
-
Technical Report TR-81, Harvard University, Aiken Computation Laboratory
-
Michael Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard University, Aiken Computation Laboratory, 1981.
-
(1981)
How to Exchange Secrets by Oblivious Transfer
-
-
Rabin, M.1
|