-
1
-
-
84947778144
-
The Decision Diffie-Hellman Problem
-
Proceedings of the Third Algorithmic Number Theory Symposium
-
D. Boneh. The Decision Diffie-Hellman Problem. In Proceedings of the Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science 1423, pp. 48-63, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
-
2
-
-
0005944705
-
Interaction in Key Distribution Schemes
-
Advances in Cryptology - Crypto '93
-
A. Beimel and B. Chor. Interaction in Key Distribution Schemes. In Advances in Cryptology - Crypto '93, Lecture Notes in Computer Science 773, pp. 444-455.
-
Lecture Notes in Computer Science
, vol.773
, pp. 444-455
-
-
Beimel, A.1
Chor, B.2
-
3
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Advances in Cryptology - Crypto '93
-
M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In Advances in Cryptology - Crypto '93, Lecture Notes in Computer Science 773, pp. 232-249.
-
Lecture Notes in Computer Science
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
85030481487
-
How to Broadcast a Secret
-
Advances in Cryptology - Eurocrypt '91
-
S. Berkovit. How to Broadcast a Secret. In Advances in Cryptology - Eurocrypt '91, Lecture Notes in Computer Science 547, pp. 536-541.
-
Lecture Notes in Computer Science
, vol.547
, pp. 536-541
-
-
Berkovit, S.1
-
6
-
-
33645422534
-
Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques
-
S. Blake-Wilson and A. Menezes. Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques. In the Security Protocols Workshop '97.
-
The Security Protocols Workshop '97
-
-
Blake-Wilson, S.1
Menezes, A.2
-
8
-
-
84955614214
-
Tradeoffs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution
-
Advances in Cryptology - Crypto '96
-
C. Blundo, L. Frota Mattos and D. Stinson. Tradeoffs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution. In Advances in Cryptology - Crypto '96, Lecture Notes in Computer Science 1109, pp. 387-400.
-
Lecture Notes in Computer Science
, vol.1109
, pp. 387-400
-
-
Blundo, C.1
Frota Mattos, L.2
Stinson, D.3
-
9
-
-
0005908666
-
Perfectly secure key distribution for dynamic conferences
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly secure key distribution for dynamic conferences. In Information and Computation, 146 (1), 1998, pp 1-23.
-
(1998)
Information and Computation
, vol.146
, Issue.1
, pp. 1-23
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
10
-
-
84957085257
-
An Efficient Public Key Traitor Tracing Scheme
-
Advances in Cryptology - Crypto '99
-
D. Boneh and M. Franklin. An Efficient Public Key Traitor Tracing Scheme. In Advances in Cryptology - Crypto '99, Lecture Notes in Computer Science 1666, pp. 338-353.
-
Lecture Notes in Computer Science
, vol.1666
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
0032661699
-
Multicast Security: A Taxonomy and Some Efficient Constructions
-
March
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor and B. Pinkas. Multicast Security: A Taxonomy and Some Efficient Constructions. In IEEE INFOCOM, 2 (March 1999), pp. 708-716.
-
(1999)
IEEE INFOCOM
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
12
-
-
84957623200
-
Efficient Communication-Storage Tradeoffs for Multicast Encryption
-
Advances in Cryptology - Eurocrypt '99
-
R. Canetti, T. Malkin and K. Nissim. Efficient Communication-Storage Tradeoffs for Multicast Encryption. In Advances in Cryptology - Eurocrypt '99, Lecture Notes in Computer Science 1592, pp. 459-474.
-
Lecture Notes in Computer Science
, vol.1592
, pp. 459-474
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
14
-
-
35048893575
-
A Key Distribution System Based on any One-Way Function
-
Advances in Cryptology - Eurocrypt '89
-
G. Davida, Y. Desmedt and R. Peralta. A Key Distribution System Based on any One-Way Function. In Advances in Cryptology - Eurocrypt '89, Lecture Notes in Computer Science 434, pp. 75-79.
-
Lecture Notes in Computer Science
, vol.434
, pp. 75-79
-
-
Davida, G.1
Desmedt, Y.2
Peralta, R.3
-
17
-
-
84979291225
-
Broadcast Encryption
-
Advances in Cryptology - Crypto '93
-
A. Fiat and M. Naor. Broadcast Encryption. In Advances in Cryptology - Crypto '93, Lecture Notes in Computer Science 773, pp. 480-491.
-
Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
18
-
-
85030309762
-
A Modular Approach to key Distribution
-
Advances in Cryptology - Crypto '90
-
W. Fumy and M. Munzert. A Modular Approach to key Distribution. In Advances in Cryptology - Crypto '90, Lecture Notes in Computer Science 537, pp. 274-283.
-
Lecture Notes in Computer Science
, vol.537
, pp. 274-283
-
-
Fumy, W.1
Munzert, M.2
-
19
-
-
22844455143
-
An Efficient Hierarchichal Identity-Based Key-Sharing Method Resistant Against Collusion-Attacks
-
G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai. An Efficient Hierarchichal Identity-Based Key-Sharing Method Resistant Against Collusion-Attacks. In Advances in Cryptology - Asiacrypt '99, pp. 348-362.
-
Advances in Cryptology - Asiacrypt '99
, pp. 348-362
-
-
Hanaoka, G.1
Nishioka, T.2
Zheng, Y.3
Imai, H.4
-
21
-
-
84957057937
-
Coding constructions for blacklisting problems without computational assumptions
-
Advances in Cryptology - Crypto '99
-
R. Kumar, S. Rajagopalan and A. Sahai. Coding constructions for blacklisting problems without computational assumptions. In Advances in Cryptology - Crypto '99, Lecture Notes in Computer Science 1666, pp. 609-623.
-
Lecture Notes in Computer Science
, vol.1666
, pp. 609-623
-
-
Kumar, R.1
Rajagopalan, S.2
Sahai, A.3
-
22
-
-
84958986237
-
Key Management for Secure Multicast with Dynamic Controllers
-
Fifth Australasian Conference on Information Security and Privacy, ACISP 2000
-
H. Kurnio, R. Safavi-Naini, W. Susilo and H. Wang. Key Management for Secure Multicast with Dynamic Controllers. Fifth Australasian Conference on Information Security and Privacy, ACISP 2000, Lecture Notes in Computer Science 1841, pp. 178-190.
-
Lecture Notes in Computer Science
, vol.1841
, pp. 178-190
-
-
Kurnio, H.1
Safavi-Naini, R.2
Susilo, W.3
Wang, H.4
-
23
-
-
84989455644
-
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem
-
Advances in Cryptology - Crypto '87
-
T. Matsumoto and H. Imai. On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. In Advances in Cryptology - Crypto '87, Lecture Notes in Computer Science 293, pp. 185-193.
-
Lecture Notes in Computer Science
, vol.293
, pp. 185-193
-
-
Matsumoto, T.1
Imai, H.2
-
25
-
-
77951458752
-
Information-Theoretically Secure Secret-Key Agreement by not Authenticated Public Discussion
-
Advances in Cryptology - Eurocrypt '97
-
U. Maurer. Information-Theoretically Secure Secret-Key Agreement by not Authenticated Public Discussion. In Advances in Cryptology - Eurocrypt '97, Lecture Notes in Computer Science 1233, pp. 209-225.
-
Lecture Notes in Computer Science
, vol.1233
, pp. 209-225
-
-
Maurer, U.1
-
28
-
-
84880852861
-
Revocation and Tracing Schemes for Stateless users
-
Advances in Cryptology - Crypto '01
-
D. Naor, M. Naor and J. Lotspiech. Revocation and Tracing Schemes for Stateless users. In Advances in Cryptology - Crypto '01, Lecture Notes in Computer Science 2139, pp. 41-62.
-
Lecture Notes in Computer Science
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
29
-
-
84944319284
-
Efficient Trace and Revoke Schemes
-
Proceedings of Financial Cryptography 2000
-
M. Naor and B. Pinkas. Efficient Trace and Revoke Schemes. In Proceedings of Financial Cryptography 2000, Lecture Notes in Computer Science (2001) 1962 pp. 1-20.
-
(2001)
Lecture Notes in Computer Science
, vol.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
34
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. How to Share a Secret. In Communications of the ACM, 22, 1979, pp. 612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
35
-
-
84947904235
-
Session Key Distribution Using Smart Cards
-
Advances in Cryptology - Eurocrypt '96
-
V. Shoup and A. Rubin. Session Key Distribution Using Smart Cards. In Advances in Cryptology - Eurocrypt '96, Lecture Notes in Computer Science 1070, pp. 321-331.
-
Lecture Notes in Computer Science
, vol.1070
, pp. 321-331
-
-
Shoup, V.1
Rubin, A.2
-
36
-
-
84898275803
-
Prepositioned Shared Secret and/or Shared Control Schemes
-
Advances in Cryptology - Eurocrypt '89
-
G. Simmons. Prepositioned Shared Secret and/or Shared Control Schemes. In Advances in Cryptology - Eurocrypt '89, Lecture Notes in Computer Science 434, pp. 436-467.
-
Lecture Notes in Computer Science
, vol.434
, pp. 436-467
-
-
Simmons, G.1
-
37
-
-
84890047469
-
Key preassigned traceability schemes for broadcast encryption
-
Selected Areas in Cryptology - SAC '98
-
D. R. Stinson and R. Wei. Key preassigned traceability schemes for broadcast encryption. in Selected Areas in Cryptology - SAC '98, Lecture Notes in Computer Science 1556, pp. 144-156.
-
Lecture Notes in Computer Science
, vol.1556
, pp. 144-156
-
-
Stinson, D.R.1
Wei, R.2
-
38
-
-
84948979276
-
Formal Requirements for key Distribution Protocols
-
Advances in Cryptology - Eurocrypt '94
-
P. Syverson and C. Meadows. Formal Requirements for key Distribution Protocols. In Advances in Cryptology - Eurocrypt '94, Lecture Notes in Computer Science 950, pp. 320-331.
-
Lecture Notes in Computer Science
, vol.950
, pp. 320-331
-
-
Syverson, P.1
Meadows, C.2
-
40
-
-
0003497269
-
Secure Group Communication Using Key Graphs
-
Also, University of Texas at Austin, Computer Science Technical Report TR
-
C. Wong, M. Gouda and S. Lam. Secure Group Communication Using Key Graphs. SIGCOMM '98. Also, University of Texas at Austin, Computer Science Technical Report TR 97-23.
-
SIGCOMM '98
-
-
Wong, C.1
Gouda, M.2
Lam, S.3
-
42
-
-
0348250970
-
A Key Distribution Paradox
-
Advances in Cryptology - Crypto '90
-
Y. Yacobi. A Key Distribution Paradox. In Advances in Cryptology - Crypto '90, Lecture Notes in Computer Science 537, pp. 268-273.
-
Lecture Notes in Computer Science
, vol.537
, pp. 268-273
-
-
Yacobi, Y.1
-
43
-
-
85032878997
-
On Key Distribution Systems
-
Advances in Cryptology - Crypto '89
-
Y. Yacobi and Z. Shmuely. On Key Distribution Systems. In Advances in Cryptology - Crypto '89, Lecture Notes in Comouter Science 435, pp. 344-355.
-
Lecture Notes in Comouter Science
, vol.435
, pp. 344-355
-
-
Yacobi, Y.1
Shmuely, Z.2
|