-
2
-
-
0038487086
-
Secret handshakes from pairing-based key agreements
-
IEEE CS
-
D. Balfanz, G. Durfee, N. Shankar, D. K. Smetters, J. Staddon, and H.-C. Wong. Secret Handshakes from Pairing-Based Key Agreements. In IEEE Symposium on Security and Privacy 2003, pages 180-196. IEEE CS, 2003.
-
(2003)
IEEE Symposium on Security and Privacy 2003
, pp. 180-196
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.K.4
Staddon, J.5
Wong, H.-C.6
-
3
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
volume 2656 of LNCS, Springer
-
M. Bellare, D. Micciancio, and B. Warinschi. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. In EUROCRYPT 2003, volume 2656 of LNCS, pages 614-629. Springer, 2003.
-
(2003)
EUROCRYPT 2003
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
4
-
-
84968468488
-
Solution of vandermonde systems of equations
-
A. Björck and V. Pereyra. Solution of Vandermonde Systems of Equations. Mathematics of Computation, 24(112):893-903, 1970.
-
(1970)
Mathematics of Computation
, vol.24
, Issue.112
, pp. 893-903
-
-
Björck, A.1
Pereyra, V.2
-
6
-
-
35048855095
-
Secret handshakes from CA-oblivious encryption
-
C. Castelluccia, S. Jarecki, and G. Tsudik. Secret Handshakes from CA-Oblivious Encryption. In ASIACRYPT 2004, volume 3329 of LNCS, pages 293-307. Springer, 2004. (Pubitemid 39747761)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3329
, pp. 293-307
-
-
Castelluccia, C.1
Jarecki, S.2
Tsudik, G.3
-
7
-
-
85024290278
-
Group signatures
-
volume 547 of LNCS, Springer
-
D. Chaum and E. van Heyst. Group Signatures. In EUROCRYPT 1991, volume 547 of LNCS, pages 257-265. Springer, 1991.
-
(1991)
EUROCRYPT 1991
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
10
-
-
85175130443
-
-
Facebook's Statistics. http://www.facebook.com/press/info.php?statistics.
-
Facebook's Statistics
-
-
-
11
-
-
79956318444
-
Okamoto-tanaka revisited: Fully authenticated diffie-hellman with minimal overhead
-
volume 6123 of LNCS, Springer
-
R. Gennaro, H. Krawczyk, and T. Rabin. Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. In ACNS 2010, volume 6123 of LNCS, pages 309-328. Springer, 2010.
-
(2010)
ACNS 2010
, pp. 309-328
-
-
Gennaro, R.1
Krawczyk, H.2
Rabin, T.3
-
12
-
-
17444362761
-
On the security of modular exponentiation with application to the construction of pseudorandom generators
-
DOI 10.1007/s00145-002-0038-7
-
O. Goldreich and V. Rosen. On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators. J. Cryptology, 16(2):71-93, 2003. (Pubitemid 41201210)
-
(2003)
Journal of Cryptology
, vol.16
, Issue.2
, pp. 71-93
-
-
Goldreich, O.1
Rosen, V.2
-
14
-
-
84867284322
-
Group secret handshakes or affiliation-hiding authenticated group key agreement
-
volume 4377 of LNCS, Springer
-
S. Jarecki, J. Kim, and G. Tsudik. Group Secret Handshakes or Affiliation-Hiding Authenticated Group Key Agreement. In CT-RSA 2007, volume 4377 of LNCS, pages 287-308. Springer, 2007.
-
(2007)
CT-RSA 2007
, pp. 287-308
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
15
-
-
43149110632
-
Beyond secret handshakes: Affiliation-hiding authenticated key exchange
-
DOI 10.1007/978-3-540-79263-5-23, Topics in Cryptology - CT-RSA 2008 - The Cryptographers' Track at the RSA Conference 2008, Proceedings
-
S. Jarecki, J. Kim, and G. Tsudik. Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. In CT-RSA 2008, volume 4964 of LNCS, pages 352-369. Springer, 2008. (Pubitemid 351641994)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4964
, pp. 352-369
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
16
-
-
38049060325
-
Unlinkable secret handshakes and key-private group key management schemes
-
volume 4521 of LNCS, Springer
-
S. Jarecki and X. Liu. Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. In ACNS 2007, volume 4521 of LNCS, pages 270-287. Springer, 2007.
-
(2007)
ACNS 2007
, pp. 270-287
-
-
Jarecki, S.1
Liu, X.2
-
17
-
-
49049101312
-
Affiliation-hiding envelope and authentication schemes with efficient support for multiple credentials
-
volume 5126 of LNCS, Springer
-
S. Jarecki and X. Liu. Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. In ICALP (2), volume 5126 of LNCS, pages 715-726. Springer, 2008.
-
(2008)
ICALP (2)
, pp. 715-726
-
-
Jarecki, S.1
Liu, X.2
-
18
-
-
70350325165
-
Private mutual authentication and conditional oblivious transfer
-
volume 5677 of LNCS, Springer
-
S. Jarecki and X. Liu. Private Mutual Authentication and Conditional Oblivious Transfer. In CRYPTO 2009, volume 5677 of LNCS, pages 90-107. Springer, 2009.
-
(2009)
CRYPTO 2009
, pp. 90-107
-
-
Jarecki, S.1
Liu, X.2
-
19
-
-
1442332544
-
Public-key cryptography standards (PKCS) #1: RSA cryptography specifications version 2.1
-
J. Jonsson and B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 (RFC 3447), 2003.
-
(2003)
RFC
, vol.3447
-
-
Jonsson, J.1
Kaliski, B.2
-
21
-
-
79956319602
-
Privacy-preserving group discovery with linear complexity
-
volume 6123 of LNCS, Springer
-
M. Manulis, B. Pinkas, and B. Poettering. Privacy-Preserving Group Discovery with Linear Complexity. In ACNS 2010, volume 6123 of LNCS, pages 420-437. Springer, 2010.
-
(2010)
ACNS 2010
, pp. 420-437
-
-
Manulis, M.1
Pinkas, B.2
Poettering, B.3
-
22
-
-
79956319822
-
Affiliation-hiding key exchange with untrusted group authorities
-
volume 6123 of LNCS, Springer
-
M. Manulis, B. Poettering, and G. Tsudik. Affiliation-Hiding Key Exchange with Untrusted Group Authorities. In ACNS 2010, volume 6123 of LNCS, pages 402-419. Springer, 2010.
-
(2010)
ACNS 2010
, pp. 402-419
-
-
Manulis, M.1
Poettering, B.2
Tsudik, G.3
-
23
-
-
77955440831
-
Taming big brother ambitions: More privacy for secret handshakes
-
volume 6205 of LNCS, Springer
-
M. Manulis, B. Poettering, and G. Tsudik. Taming Big Brother Ambitions: More Privacy for Secret Handshakes. In PETS 2010, volume 6205 of LNCS, pages 149-165. Springer, 2010.
-
(2010)
PETS 2010
, pp. 149-165
-
-
Manulis, M.1
Poettering, B.2
Tsudik, G.3
-
25
-
-
84968484435
-
Speeding the pollard and elliptic curve methods of factorization
-
P. L. Montgomery. Speeding the Pollard and Elliptic Curve Methods of Factorization. Mathematics of Computation, 48(177):243-264, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 243-264
-
-
Montgomery, P.L.1
-
26
-
-
33751508709
-
-
National Institute of Standards and Technology (NIST). SP 800-57 Part 1
-
National Institute of Standards and Technology (NIST). SP 800-57 Part 1, Recommendation for Key Management, 2007.
-
(2007)
Recommendation for Key Management
-
-
-
28
-
-
49049098105
-
A flexible framework for secret handshakes
-
volume 4258 of LNCS, Springer
-
G. Tsudik and S. Xu. A Flexible Framework for Secret Handshakes. In PETS 2006, volume 4258 of LNCS, pages 295-315. Springer, 2006.
-
(2006)
PETS 2006
, pp. 295-315
-
-
Tsudik, G.1
Xu, S.2
-
30
-
-
33947133548
-
On the numerical inversion of a recurrent problem: The vandermonde matrix
-
H. J. Wertz. On the Numerical Inversion of a Recurrent Problem: The Vandermonde Matrix. In IEEE Transactions on Automatic Control, 1965.
-
(1965)
IEEE Transactions on Automatic Control
-
-
Wertz, H.J.1
|