-
2
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
M. Ben-Or, S. Goldwasser, A. Wigderson, “Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation”, Proceedings of the 20th ACM Symposium on the Theory of Computing, pp.1-10, 1988.
-
(1988)
Proceedings of the 20Th ACM Symposium on the Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
85030481487
-
How to Broadcast a Secret
-
Springer-Verlag
-
S. Berkovits, “How to Broadcast a Secret”, Proceedings of Advances in Cryptology-Eurocrypt’91, Lecture Notes in Computer Science 547, Springer-Verlag, pp.535-541, 1991.
-
(1991)
Proceedings of Advances in Cryptology-Eurocrypt’91, Lecture Notes in Computer Science
, vol.547
, pp. 535-541
-
-
Berkovits, S.1
-
4
-
-
84884730529
-
An Optimal Class of Symmetric Key Generation Systems
-
Springer-Verlag
-
R. Blom, “An Optimal Class of Symmetric Key Generation Systems”, Proceedings of Advances in Cryptology-Eurocrypt’84, Lecture Notes in Computer Science 196, Springer-Verlag, pp.335-338, 1984.
-
(1984)
Proceedings of Advances in Cryptology-Eurocrypt’84, Lecture Notes in Computer Science
, vol.196
, pp. 335-338
-
-
Blom, R.1
-
5
-
-
85028765277
-
Perfectly-Secure Key Distribution for Dynamic Conferences
-
Springer-Verlag
-
C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung, “Perfectly-Secure Key Distribution for Dynamic Conferences”, Proceedings of Advances in Cryptology-Crypto’92, Lecture Notes in Computer Science 740, Springer-Verlag, pp.471-486, 1992.
-
(1992)
Proceedings of Advances in Cryptology-Crypto’92, Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
6
-
-
84955621986
-
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Problems
-
Springer-Verlag
-
D. Boneh, R. Venkatesan, “Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Problems”, Proceedings of Advances in Cryptology-Crypto’96, Lecture Notes in Computer Science 1109, Springer-Verlag, pp.129-142, 1996.
-
(1996)
Proceedings of Advances in Cryptology-Crypto’96, Lecture Notes in Computer Science
, vol.1109
, pp. 129-142
-
-
Boneh, D.1
Venkatesan, R.2
-
7
-
-
84948991087
-
A Secure and Efficient Conference Key Distribution System
-
Springer-Verlag
-
M. Burmester, Y. Desmedt, “A Secure and Efficient Conference Key Distribution System”, Proceedings of Advances in Cryptology-Eurocrypt’94, Lecture Notes in Computer Science 950, Springer-Verlag, pp.275-286, 1994.
-
(1994)
Proceedings of Advances in Cryptology-Eurocrypt’94, Lecture Notes in Computer Science
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
8
-
-
0031619016
-
The Random Oracle Methodology Revisited
-
R. Canetti, O. Goldreich, S. Halevi, “The Random Oracle Methodology Revisited”, Proceedings of the 30th STOC, pp.209-218, 1998.
-
(1998)
Proceedings of the 30Th STOC
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
10
-
-
84957801156
-
The Design of a Conference Key Distribution System
-
Springer-Verlag
-
C.C. Chang, T.C. Wu, C.P. Chen, “The Design of a Conference Key Distribution System”, Proceedings of Advances in Cryptology-Auscrypt’92, Lecture Notes in Computer Science 718, Springer-Verlag, pp.459-466, 1992.
-
(1992)
Proceedings of Advances in Cryptology-Auscrypt’92, Lecture Notes in Computer Science
, vol.718
, pp. 459-466
-
-
Chang, C.C.1
Wu, T.C.2
Chen, C.P.3
-
13
-
-
1542593353
-
Authentication and Authenticated Key Exchanges
-
W. Diffie, P.C. van Oorschot, M.J. Weiner, “Authentication and Authenticated Key Exchanges”, Design, Codes and Cryptography Vol. 2, pp.107-125, 1992.
-
(1992)
Design, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Weiner, M.J.3
-
14
-
-
0024135240
-
Zero-Knowledge Proof of Identity
-
U. Feige, A. Fiat, A. Shamir, “Zero-Knowledge Proof of Identity”, Journal of Cryptology Vol. 1, pp.77-94, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
15
-
-
85031905507
-
On the Composition of Zero-Knowledge Proof Systems
-
Springer-Verlag
-
O. Goldreich, H. Krawczyk, “On the Composition of Zero-Knowledge Proof Systems”, ICALP 90, Lecture Notes in Computer Science 443, pp.268-282, Springer-Verlag, 1990.
-
(1990)
ICALP 90, Lecture Notes in Computer Science
, vol.443
, pp. 268-282
-
-
Goldreich, O.1
Krawczyk, H.2
-
16
-
-
0028017207
-
Identity-Based Conference Key Broadcast Systems
-
T. Hwang, J.L. Chen, “Identity-Based Conference Key Broadcast Systems”, Proceedings of IEE Computers and Digital Techniques, Vol. 141, No. 1, pp.57-60, 1994.
-
(1994)
Proceedings of IEE Computers and Digital Techniques
, vol.141
, Issue.1
, pp. 57-60
-
-
Hwang, T.1
Chen, J.L.2
-
17
-
-
0020180459
-
A Conference Key Distribution System
-
I. Ingemarsson, D.T. Tang, C.K. Wong, “A Conference Key Distribution System”, IEEE Transactions on Information Theory, Vol. IT-28, No. 5, pp.714-720, 1982.
-
(1982)
IEEE Transactions on Information Theory
, vol.IT-28
, Issue.5
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.T.2
Wong, C.K.3
-
18
-
-
0347265673
-
Conference Key Distribution Protocols in Distributed Systems
-
B. Klein, M. Otten, T. Beth, “Conference Key Distribution Protocols in Distributed Systems”, Proceedings of Codes and Ciphers-Cryptography and Coding IV, IMA, pp.225-242, 1995.
-
(1995)
Proceedings of Codes and Ciphers-Cryptography and Coding IV, IMA
, pp. 225-242
-
-
Klein, B.1
Otten, M.2
Beth, T.3
-
19
-
-
84957796369
-
Secure Conference Key Distribution Schemes for Conspiracy Attack
-
Springer-Verlag
-
K. Koyama, “Secure Conference Key Distribution Schemes for Conspiracy Attack”, Proceedings of Advances in Cryptology-Eurocrypt’92, Lecture Notes in Computer Science 658, Springer-Verlag, pp.449-453, 1992.
-
(1992)
Proceedings of Advances in Cryptology-Eurocrypt’92, Lecture Notes in Computer Science
, vol.658
, pp. 449-453
-
-
Koyama, K.1
-
20
-
-
84990736101
-
Identity-Based Conference Key Distribution Systems
-
Springer-Verlag
-
K. Koyama, K. Ohta, “Identity-Based Conference Key Distribution Systems”, Proceedings of Advances in Cryptology-Crypto’87, Lecture Notes in Computer Science 293, Springer-Verlag, pp.175-184, 1987.
-
(1987)
Proceedings of Advances in Cryptology-Crypto’87, Lecture Notes in Computer Science
, vol.293
, pp. 175-184
-
-
Koyama, K.1
Ohta, K.2
-
21
-
-
84990740394
-
Security of Improved Identity-Based Conference Key Distributioin Systems
-
Springer-Verlag
-
K. Koyama, K. Ohta, “Security of Improved Identity-Based Conference Key Distributioin Systems”, Proceedings of Advances in Cryptology-Eurocrypt’88, Lecture Notes in Computer Science 330, Springer-Verlag, pp.11-19, 1988.
-
(1988)
Proceedings of Advances in Cryptology-Eurocrypt’88, Lecture Notes in Computer Science
, vol.330
, pp. 11-19
-
-
Koyama, K.1
Ohta, K.2
-
22
-
-
84989455644
-
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem
-
Springer-Verlag
-
T. Matsumoto, H. Imai, “On the Key Predistribution System: A Practical Solution to the Key Distribution Problem”, Proceedings of Advances in Cryptology-’87, Lecture Notes in Computer Science 293, Springer-Verlag, pp.185-193, 1987.
-
(1987)
Proceedings of Advances in Cryptology-’87, Lecture Notes in Computer Science
, vol.293
, pp. 185-193
-
-
Matsumoto, T.1
Imai, H.2
-
23
-
-
84927727752
-
Security proofs for signatue schemes
-
Springer-Verlag
-
D. Pointcheval, J. Stern.”Security proofs for signatue schemes”, Proceedings of Advances in Cryptology-Eurocrypt’96, Lecture Notes in Computer Science 1070, Springer-Verlag, pp.387-398, 1996.
-
(1996)
Proceedings of Advances in Cryptology-Eurocrypt’96, Lecture Notes in Computer Science
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
25
-
-
84957810610
-
Cryptanalysis of Several Conference Key Distribution Schemes
-
Springer-Verlag
-
A. Shimbo, S.I. Kawamura, “Cryptanalysis of Several Conference Key Distribution Schemes”, Proceedings of Advances in Cryptology-Asiacrypt’91, Lecture Notes in Computer Science 739, Springer-Verlag, pp.265-276, 1991.
-
(1991)
Proceedings of Advances in Cryptology-Asiacrypt’91, Lecture Notes in Computer Science
, vol.739
, pp. 265-276
-
-
Shimbo, A.1
Kawamura, S.I.2
-
26
-
-
84942550160
-
Lower Bounds for Discrete Logarithms and Related Problems
-
Springer-Verlag
-
V. Shoup, “Lower Bounds for Discrete Logarithms and Related Problems”, Proceedings of Advances in Cryptology-Eurocrypt’97, Lecture Notes in Computer Science 1233, Springer-Verlag, pp.256-266, 1997.
-
(1997)
Proceedings of Advances in Cryptology-Eurocrypt’97, Lecture Notes in Computer Science
, vol.1233
, pp. 256-266
-
-
Shoup, V.1
-
27
-
-
84978523717
-
A Secure Audio Teleconference SystemProceedings of Advances in Cryptology-Crypto’88
-
Springer-Verlag
-
D.G. Steer, L. Strawczynski, W. Diffie, M. Wiener, “A Secure Audio Teleconference System”, Proceedings of Advances in Cryptology-Crypto’88, Lecture Notes in Computer Science 409, Springer-Verlag, pp.520-528, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.409
, pp. 520-528
-
-
Steer, D.G.1
Strawczynski, L.2
Diffie, W.3
Wiener, M.4
-
28
-
-
84957807365
-
A Practical and Secure Fault-tolerant Conference-key Agreement Protocol
-
Springer-Verlag
-
W.G. Tzeng, “A Practical and Secure Fault-tolerant Conference-key Agreement Protocol”, Proceedings of Public Key Cryptography-PKC 2000, Lecture Notes in Computer Science 1751, Springer-Verlag, pp.1-13, 2000.
-
(2000)
Proceedings of Public Key Cryptography-Pkc 2000, Lecture Notes in Computer Science
, vol.1751
, pp. 1-13
-
-
Tzeng, W.G.1
-
29
-
-
0031098126
-
Conference Key Distribution System with User Anonymity Based on Algebraic Approach
-
T.C. Wu, “Conference Key Distribution System with User Anonymity Based on Algebraic Approach”, Proceedings of IEE Computers and Digital Techniques, Vol. 144, No 2, pp.145-148, 1997.
-
(1997)
Proceedings of IEE Computers and Digital Techniques
, vol.144
, Issue.2
, pp. 145-148
-
-
Wu, T.C.1
-
30
-
-
84863285641
-
Attack on the Koyama-Ohta Identity Based Key Distribution Scheme
-
Springer-Verlag
-
Y. Yacobi, “Attack on the Koyama-Ohta Identity Based Key Distribution Scheme”, Proceedings of Advances in Cryptology-Crypto’87, Lecture Notes in Computer Science 293, Springer-Verlag, pp429-433, 1987.
-
(1987)
Proceedings of Advances in Cryptology-Crypto’87, Lecture Notes in Computer Science
, vol.293
, pp. 429-433
-
-
Yacobi, Y.1
|