-
1
-
-
34547139941
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 20(3), 395 (2007)
-
(2007)
Journal of Cryptology
, vol.20
, Issue.3
, pp. 395
-
-
Abadi, M.1
Rogaway, P.2
-
2
-
-
1442292329
-
A composable cryptographic library with nested operations
-
ACM Press, New York
-
Backes, M., Pfitzmann, B., Waidner, M.: A composable cryptographic library with nested operations. In: ACM CCS 2003, Washington D.C., USA, October 27-30, pp. 220-230. ACM Press, New York (2003)
-
(2003)
ACM CCS 2003, Washington D.C., USA, October 27-30
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM Press, New York
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS 1993, Fairfax, Virginia, USA, November 3-5, pp. 62-73. ACM Press, New York (1993)
-
(1993)
ACM CCS 1993, Fairfax, Virginia, USA, November 3-5
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
67049095592
-
Signing a linear subspace: Signature schemes for network coding
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: Signature schemes for network coding. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 68-87. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 68-87
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
5
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402-414. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
6
-
-
35248839965
-
A signature scheme with efficient protocols
-
Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
7
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE Computer Society Press, Los Alamitos
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd FOCS, Las Vegas, Nevada, USA, October 14-17, pp. 136-145. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
42nd FOCS, Las Vegas, Nevada, USA, October 14-17
, pp. 136-145
-
-
Canetti, R.1
-
8
-
-
84890013435
-
Signature schemes based on the strong RSA assumption
-
Kent Ridge Digital Labs, Singapore, November 1-4, ACM Press, New York
-
Cramer, R., Shoup, V.: Signature schemes based on the strong RSA assumption. In: ACM CCS 1999, Kent Ridge Digital Labs, Singapore, November 1-4, pp. 46-51. ACM Press, New York (1999)
-
(1999)
ACM CCS 1999
, pp. 46-51
-
-
Cramer, R.1
Shoup, V.2
-
9
-
-
0019649307
-
On the security of public key protocols
-
Dolev, D., Yao, A.C.: On the security of public key protocols. In: FOCS, pp. 350-357 (1981)
-
(1981)
FOCS
, pp. 350-357
-
-
Dolev, D.1
Yao, A.C.2
-
10
-
-
35248856345
-
The Cramer-Shoup strong-RSA signature scheme revisited
-
Desmedt, Y.G. (ed.) PKC 2003. Springer, Heidelberg
-
Fischlin, M.: The Cramer-Shoup strong-RSA signature scheme revisited. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 116-129. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2567
, pp. 116-129
-
-
Fischlin, M.1
-
11
-
-
84957661041
-
Secure hash-and-sign signatures without the random oracle
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Gennaro, R., Halevi, S., Rabin, T.: Secure hash-and-sign signatures without the random oracle. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 123-139. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 123-139
-
-
Gennaro, R.1
Halevi, S.2
Rabin, T.3
-
12
-
-
78649897589
-
Secure network coding over the integers
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
-
Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure network coding over the integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 142-160. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 142-160
-
-
Gennaro, R.1
Katz, J.2
Krawczyk, H.3
Rabin, T.4
-
13
-
-
51849152334
-
Programmable hash functions and their applications
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Hofheinz, D., Kiltz, E.: Programmable hash functions and their applications. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 21-38. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 21-38
-
-
Hofheinz, D.1
Kiltz, E.2
-
15
-
-
84959444946
-
Chameleon signatures
-
The Internet Society, San Diego
-
Krawczyk, H., Rabin, T.: Chameleon signatures. In: NDSS 2000, San Diego, California, USA, February 2-4. The Internet Society, San Diego (2000)
-
(2000)
NDSS 2000, San Diego, California, USA, February 2-4
-
-
Krawczyk, H.1
Rabin, T.2
-
16
-
-
24944587257
-
The RSA group is pseudo-free
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Micciancio, D.: The RSA group is pseudo-free. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 387-403. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 387-403
-
-
Micciancio, D.1
-
17
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Naor, M. (ed.) TCC 2004. Springer, Heidelberg
-
Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133-151. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
18
-
-
35048877679
-
On the notion of pseudo-free groups
-
Naor, M. (ed.) TCC 2004. Springer, Heidelberg
-
Rivest, R.L.: On the notion of pseudo-free groups. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 505-521. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2951
, pp. 505-521
-
-
Rivest, R.L.1
-
19
-
-
0035475986
-
New digital signature scheme attaining immunity to adaptive chosenmessage attack
-
Zhu, H.: New digital signature scheme attaining immunity to adaptive chosenmessage attack. Chinese Journal of Electronics 10(4), 484-486 (2001)
-
(2001)
Chinese Journal of Electronics
, vol.10
, Issue.4
, pp. 484-486
-
-
Zhu, H.1
-
20
-
-
38049071972
-
A formal proof of Zhu's signature scheme
-
ePrint Archive, Report 2003/155
-
H. Zhu. A formal proof of Zhu's signature scheme. Cryptology ePrint Archive, Report 2003/155 (2003), http://eprint.iacr.org/
-
(2003)
Cryptology
-
-
Zhu, H.1
|