-
1
-
-
33746365751
-
Secure multi-party protocols and zero-knowledge proof systems tolerating a fault minority
-
D. Beaver. Secure Multi-party Protocols and Zero-Knowledge Proof Systems Tolerating a Fault Minority. Journal of Cryptology, Vol. 4, pages 75-122, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 75-122
-
-
Beaver, D.1
-
2
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Springer-Verlag (LNCS 1807)
-
M. Bellare, D. Pointcheval and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In EuroCrypt 2000, Springer-Verlag (LNCS 1807), pages 139-155, 2000.
-
(2000)
EuroCrypt 2000
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM
-
M. Bellare and P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In 1st Conf. on Computer and Communications Security, ACM, pages 62-73, 1993.
-
(1993)
1st Conf. on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84945119254
-
Entity authentication and key distribution
-
Springer-Verlag (LNCS 773)
-
M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In CRYPTO'93, Springer-Verlag (LNCS 773), pages 232-249, 1994.
-
(1994)
CRYPTO'93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
S. M. Bellovin and M. Merritt. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In Proceedings of the 1st ACM Conference on Computer and Communication Security, pages 244-250, 1993.
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communication Security
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
7
-
-
0003030602
-
Coin flipping by phone
-
February
-
M. Blum. Coin Flipping by Phone. IEEE Spring COMPCOM, pages 133-137, February 1982.
-
(1982)
IEEE Spring COMPCOM
, pp. 133-137
-
-
Blum, M.1
-
8
-
-
84949995981
-
An efficient probabilistic public-key encryption scheme which hides all partial information
-
Springer-Verlag (LNCS 196)
-
M. Blum and S. Goldwasser. An Efficient Probabilistic Public-Key Encryption Scheme which hides all partial information. In CRYPTO'84, Springer-Verlag (LNCS 196), pages 289-302.
-
CRYPTO'84
, pp. 289-302
-
-
Blum, M.1
Goldwasser, S.2
-
9
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SICOMP, Vol. 13, pages 850-864, 1984.
-
(1984)
SICOMP
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
10
-
-
33748099130
-
-
Preliminary version
-
Preliminary version in 23rd FOCS, 1982.
-
(1982)
23rd FOCS
-
-
-
12
-
-
84937550984
-
Provably secure password-authenticated key exchange using diffie-hellman
-
Springer-Verlag (LNCS 1807)
-
V. Boyko, P. MacKenzie and S. Patel. Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman. In EuroCrypt 2000, Springer-Verlag (LNCS 1807), pages 156-171, 2000.
-
(2000)
EuroCrypt 2000
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
13
-
-
0000731055
-
Security and composition of multi-party cryptographic protocols
-
R. Canetti. Security and Composition of Multi-party Cryptographic Protocols. Journal of Cryptology, Vol. 13, No. 1, pages 143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
14
-
-
0003551074
-
A unified framework for analyzing security of protocols
-
R. Canetti. A unified framework for analyzing security of protocols. Cryptology ePrint Archive, Report No. 2000/067, 2000. Available from http://eprint.iacr.org.
-
(2000)
Cryptology EPrint Archive, Report No. 2000/067
-
-
Canetti, R.1
-
15
-
-
0031619016
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi. The Random Oracle Methodology, Revisited. In Proc. of the 30th STOC, pages 209-218, 1998.
-
(1998)
Proc. of the 30th STOC
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
18
-
-
0024984004
-
Witness indistinguishability and witness hiding protocols
-
U. Feige and A. Shamir. Witness Indistinguishability and Witness Hiding Protocols. In 22nd STOC, pages 416-426, 1990.
-
(1990)
22nd STOC
, pp. 416-426
-
-
Feige, U.1
Shamir, A.2
-
20
-
-
0022793132
-
How to construct random functions
-
Preliminary version, 1998. Available from http://www.wisdom.weizmann.ac. il/~oded/pp.html.
-
(1986)
JACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
21
-
-
0000108216
-
How to construct constant-round zero-knowledge proof systems for NP
-
O. Goldreich, S. Goldwasser, and S. Micali. How to Construct Random Functions. JACM, Vol. 33, No. 4, pages 792-807, 1986.
-
(1996)
Journal of Cryptology
, vol.9
, pp. 167-189
-
-
Goldreich, O.1
Kahan, A.2
-
22
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
For details see [18]
-
O. Goldreich and A. Kahan. How To Construct Constant-Round Zero-Knowledge Proof Systems for NP. Journal of Cryptology, Vol. 9, pages 167-189, 1996.
-
(1987)
19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
23
-
-
0021409284
-
Probabilistic encryption
-
O. Goldreich, S. Micali and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987. For details see [18].
-
(1984)
JCSS
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
25
-
-
0030261758
-
Strong password-only authenticated key exchange
-
S. Halevi and H. Krawczyk. Public-Key Cryptography and Password Protocols. In ACM Conference on Computer and Communications Security, 1998.
-
(1996)
SIGCOMM Comput. Commun. Rev.
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.P.1
-
26
-
-
0030261758
-
Practical password-authenticated key exchange provably secure under standard assumptions
-
D. P. Jablon. Strong password-only authenticated key exchange. SIGCOMM Comput. Commun. Rev., Vol 26, No. 5, pages 5-26, 1996.
-
Eurocrypt 2001
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
31
-
-
35248839747
-
-
Preliminary version Springer-Verlag (LNCS 576)
-
S. Micali and P. Rogaway. Secure Computation. Unpublished manuscript, 1992. Preliminary version in Crypto'91, Springer-Verlag (LNCS 576), 1991.
-
(1991)
Crypto'91
-
-
-
32
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
M. Naor and B. Pinkas. Oblivious Transfer and Polynomial Evaluation. In 31st STOC, pages 245-254, 1999.
-
(1999)
31st STOC
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
34
-
-
84957621865
-
On the concurrent composition of zero-knowledge proofs
-
R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. In EuroCrypt99, pages 415-431.
-
EuroCrypt99
, pp. 415-431
-
-
Richardson, R.1
Kilian, J.2
-
35
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Feb.
-
R. Rivest, A. Shamir and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. CACM, Vol. 21, Feb. 1978, pages 120-126.
-
(1978)
CACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
36
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudi and M. Waidner. Refinement and extension of encrypted key exchange. ACM SIGOPS Oper. Syst. Rev., Vol. 29, 3, pages 22-30, 1995.
-
(1995)
ACM SIGOPS Oper. Syst. Rev.
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudi, G.2
Waidner, M.3
-
38
-
-
0020301290
-
Theory and application of trapdoor functions
-
A.C. Yao. Theory and Application of Trapdoor Functions. In 23rd FOCS, pages 80-91, 1982.
-
(1982)
23rd FOCS
, pp. 80-91
-
-
Yao, A.C.1
-
39
-
-
0022882770
-
How to generate and exchange secrets
-
A.C. Yao. How to Generate and Exchange Secrets. In 27th FOCS, pages 162-167, 1986.
-
(1986)
27th FOCS
, pp. 162-167
-
-
Yao, A.C.1
|