-
1
-
-
70350302872
-
Smooth projective hashing for conditionally extractable commitments
-
Halevi, S. (ed.) LNCS Springer, Heidelberg
-
Abdalla, M., Chevalier, C., Pointcheval, D.: Smooth projective hashing for conditionally extractable commitments. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 671-689. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009
, vol.5677
, pp. 671-689
-
-
Abdalla, M.1
Chevalier, C.2
Pointcheval, D.3
-
2
-
-
33745126318
-
Secure computation without authentication
-
Shoup, V. (ed.) LNCS Springer, Heidelberg
-
Barak, B., Canetti, R., Lindell, Y., Pass, R., Rabin, T.: Secure computation without authentication. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 361-377. Springer, Heidelberg (2005), http://eprint.iacr.org/2007/464
-
(2005)
CRYPTO 2005
, vol.3621
, pp. 361-377
-
-
Barak, B.1
Canetti, R.2
Lindell, Y.3
Pass, R.4
Rabin, T.5
-
3
-
-
85048601848
-
Cryptographic protocols provably secure against dynamic adversaries
-
Rueppel, R.A. (ed.) LNCS Springer, Heidelberg
-
Beaver, D., Haber, S.: Cryptographic protocols provably secure against dynamic adversaries. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 307-323. Springer, Heidelberg (1993)
-
(1993)
EUROCRYPT 1992
, vol.658
, pp. 307-323
-
-
Beaver, D.1
Haber, S.2
-
4
-
-
84995447456
-
-
Cryptology ePrint Archive, Report 2010/055
-
Camenisch, J., Casati, N., Gross, T., Shoup, V.: Credential authenticated identification and key exchange. Cryptology ePrint Archive, Report 2010/055 (2010), http://eprint.iacr.org/
-
(2010)
Credential Authenticated Identification and Key Exchange
-
-
Camenisch, J.1
Casati, N.2
Gross, T.3
Shoup, V.4
-
5
-
-
84945135810
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
Camenisch, J., Lysyanskaya, L.: Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Crypto 2001, pp. 93-118 (2001)
-
(2001)
Crypto 2001
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, L.2
-
6
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Boneh, D. (ed.) LNCS Springer, Heidelberg
-
Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 126-144. Springer, Heidelberg (2003), http://eprint.iacr.org/2002/161
-
(2003)
CRYPTO 2003
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
8
-
-
38049064364
-
Universally composable security with global setup
-
Full version at
-
Canetti, R., Dodis, Y., Pass, R., Walfish, S.: Universally composable security with global setup. In: Theory of Cryptography 2007, pp. 61-85 (2007), Full version at http://eprint.iacr.org/2006/432
-
(2007)
Theory of Cryptography 2007
, pp. 61-85
-
-
Canetti, R.1
Dodis, Y.2
Pass, R.3
Walfish, S.4
-
9
-
-
24944566824
-
Universally composable password-based key exchange
-
Cramer, R. (ed.) LNCS Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J., Lindell, Y., MacKenzie, P.: Universally composable password-based key exchange. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 404-421. Springer, Heidelberg (2005)
-
(2005)
EUROCRYPT 2005
, vol.3494
, pp. 404-421
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
Lindell, Y.4
MacKenzie, P.5
-
10
-
-
35248819315
-
Universal composition with joint state
-
Boneh, D. (ed.) LNCS Springer, Heidelberg
-
Canetti, R., Rabin, T.: Universal composition with joint state. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 265-281. Springer, Heidelberg (2003), http://eprint.iacr.org/2002/047
-
(2003)
CRYPTO 2003
, vol.2729
, pp. 265-281
-
-
Canetti, R.1
Rabin, T.2
-
11
-
-
33749542277
-
A method for making password-based key exchange resilient to server compromise
-
Dwork, C. (ed.) LNCS Springer, Heidelberg
-
Gentry, C., MacKenzie, P., Ramzan, Z.: A method for making password-based key exchange resilient to server compromise. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 142-159. Springer, Heidelberg (2006)
-
(2006)
CRYPTO 2006
, vol.4117
, pp. 142-159
-
-
Gentry, C.1
MacKenzie, P.2
Ramzan, Z.3
-
12
-
-
43149110632
-
Beyond secret handshakes: Affiliation-hiding authenticated key agreement
-
Malkin, T.G. (ed.) LNCS Springer, Heidelberg
-
Jarecki, S., Kim, J., Tsudik, G.: Beyond secret handshakes: affiliation-hiding authenticated key agreement. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 352-369. Springer, Heidelberg (2008)
-
(2008)
CT-RSA 2008
, vol.4964
, pp. 352-369
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
13
-
-
84948968753
-
Adaptively secure threshold cryptography: Introducing concurrency, removing erasures
-
Preneel, B. (ed.) LNCS Springer, Heidelberg
-
Jarecki, S., Lysyanskaya, A.: Adaptively secure threshold cryptography: introducing concurrency, removing erasures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 221-242. Springer, Heidelberg (2000)
-
(2000)
EUROCRYPT 2000
, vol.1807
, pp. 221-242
-
-
Jarecki, S.1
Lysyanskaya, A.2
|