-
2
-
-
25844497297
-
The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme
-
M. Bellare, C. Namprempre, D. Pointcheval, M. Semanko, The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme, Financial Cryptography 2001, pp.309-328, 2001.
-
(2001)
Financial Cryptography
, vol.2001
, pp. 309-328
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
4
-
-
0014814325
-
Space/time Trade-offs inHash Coding with Allowable Errors
-
B.H. Bloom, Space/time Trade-offs inHash Coding with Allowable Errors, Communication of the ACM 13(7), pp.422-427, 1970.
-
(1970)
Communication of The Acm
, vol.13
, Issue.7
, pp. 422-427
-
-
Bloom, B.H.1
-
5
-
-
35248880074
-
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie- Hellman-Group Signature Scheme
-
A. Boldyreva, Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie- Hellman-Group Signature Scheme, Public Key Cryptography 2003, pp.31-46, 2003.
-
(2003)
Public Key Cryptography
, vol.2003
, pp. 31-46
-
-
Boldyreva, A.1
-
6
-
-
70450232823
-
Network Applications of Bloom Filters: A Survey
-
A. Broder, M. Mitzenmacher, Network Applications of Bloom Filters: A Survey, Internet Math, Volume 1, Number 4 (2003), 485-509.
-
(2003)
Internet Math
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
7
-
-
38049132285
-
Simulatable Adaptive Oblivious Transfer
-
J. Camenisch, G. Neven, A. Shelat, Simulatable Adaptive Oblivious Transfer, EUROCRYPT 2007, pp.573-590, 2007.
-
(2007)
Eurocrypt
, vol.2007
, pp. 573-590
-
-
Camenisch, J.1
Neven, G.2
Shelat, A.3
-
8
-
-
0020915882
-
Blind Signature for Untraceable Payments
-
D. Chaum, Blind Signature for Untraceable Payments, CRYPTO 1982, pp.199-203, 1983.
-
(1983)
Crypto
, vol.1982
, pp. 199-203
-
-
Chaum, D.1
-
9
-
-
24144488603
-
Keyword Search and Oblivious Pseudorandom Functions
-
M.J. Freedman, Y. Ishai, B. Pinkas, O. Reingold, Keyword Search and Oblivious Pseudorandom Functions, TCC 2005, pp.303-324, 2005.
-
(2005)
Tcc
, vol.2005
, pp. 303-324
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
10
-
-
35048820609
-
Efficient Private Matching and Set Intersection
-
M.J. Freedman, K. Nissim, B. Pinkas, Efficient Private Matching and Set Intersection, EUROCRYPT 2004, pp.1-19, 2004.
-
(2004)
Eurocrypt
, vol.2004
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
12
-
-
40249108370
-
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
-
C. Hazay, Y. Lindell, Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries, TCC 2008, pp.155-175, 2008.
-
(2008)
Tcc
, vol.2008
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
13
-
-
33244488406
-
-
Cryptology ePrint Archive, 216
-
E.J. Goh, Secure Indexes, Cryptology ePrint Archive, 2003/216.
-
(2003)
Secure Indexes
-
-
Goh, E.J.1
-
14
-
-
1942420748
-
Oblivious Keyword Search
-
W. Ogata, K. Kurosawa, Oblivious Keyword Search, J. Complexity 20(2-3), pp.356-371, 2004.
-
(2004)
J. Complexity
, vol.20
, Issue.2-3
, pp. 356-371
-
-
Ogata, W.1
Kurosawa, K.2
|