-
1
-
-
84956854310
-
Mix-networks on permutation networks
-
M. Abe. Mix-networks on permutation networks. Asiacrypt’99, LNCS 1716, pages 258–273. 1999.
-
(1999)
Asiacrypt’99, LNCS
, vol.1716
, pp. 258-273
-
-
Abe, M.1
-
2
-
-
84957069963
-
Robust distributed multiplication without interaction
-
M. Wiener, editor
-
M. Abe. Robust distributed multiplication without interaction. In M. Wiener, editor, in Cryptology—CRYPTO’99, LNCS 1666, pages 130–147. 1999.
-
(1999)
Cryptology—CRYPTO’99, LNCS
, vol.1666
, pp. 130-147
-
-
Abe, M.1
-
3
-
-
0034224836
-
Universally verifiable mix-net with verification work independent of the number of mix-servers
-
July, Presented in Eurocrypt’98
-
M. Abe. Universally verifiable mix-net with verification work independent of the number of mix-servers. IEICE Trans. Fundamentals, E83-A(7):1431–1440, July 2000. Presented in Eurocrypt’98.
-
(2000)
IEICE Trans. Fundamentals
, vol.E83-A
, Issue.7
, pp. 1431-1440
-
-
Abe, M.1
-
4
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. CRYPTO’98, LNCS 1462, pages 26–45. 1998.
-
(1998)
CRYPTO’98, LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
5
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. ACM CCCS, pages 62–73. 1993.
-
(1993)
ACM CCCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84957712291
-
An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
-
R. Canetti and S. Goldwasser. An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. Eurocrypt’99, LNCS 1592, pages 90–106. 1999.
-
(1999)
Eurocrypt’99, LNCS
, vol.1592
, pp. 90-106
-
-
Canetti, R.1
Goldwasser, S.2
-
7
-
-
0019532104
-
Untraceable electronic mail, return address, and digital pseudonyms
-
D. L. Chaum. Untraceable electronic mail, return address, and digital pseudonyms. Comm. of the ACM, 24:84–88, 1981.
-
(1981)
Comm. Of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.L.1
-
8
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. CRYPTO’98, LNCS 1462, pages 13–25. 1998.
-
(1998)
CRYPTO’98, LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
9
-
-
84948958135
-
How to break a practical MIX and design a new one
-
Y. Desmedt and K. Kurosawa. How to break a practical MIX and design a new one. Eurocrypt 2000, LNCS 1807, pages 557–572. 2000.
-
(2000)
Eurocrypt 2000, LNCS
, vol.1807
, pp. 557-572
-
-
Desmedt, Y.1
Kurosawa, K.2
-
10
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes. CRYPTO’99
-
E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. CRYPTO’99, LNCS 1666, pages 537–554. 1999.
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
11
-
-
84956868340
-
Decision oracles are equivalent to matching oracles
-
H. Handschuh, Y. Tsiounis, and M. Yung. Decision oracles are equivalent to matching oracles. PKC’99, LNCS 1560, pages 276–289. 1999.
-
(1999)
PKC’99, LNCS
, vol.1560
, pp. 276-289
-
-
Handschuh, H.1
Tsiounis, Y.2
Yung, M.3
-
12
-
-
84957709438
-
A practical mix
-
M. Jakobsson. A practical mix. Eurocrypt’98, LNCS 1403, pages 448–461. 1998.
-
(1998)
Eurocrypt’98, LNCS
, vol.1403
, pp. 448-461
-
-
Jakobsson, M.1
-
14
-
-
0005301131
-
-
Tech. Report 99-33, DIMACS, June
-
A. Juels and M. Jakobsson. Millimix. Tech. Report 99-33, DIMACS, June 1999.
-
(1999)
Millimix
-
-
Juels, A.1
Jakobsson, M.2
-
16
-
-
84955592437
-
Some remarks on a receipt-free and universally verifiable mix-type voting scheme
-
M. Michels and P. Horster. Some remarks on a receipt-free and universally verifiable mix-type voting scheme. Asiacrypt’96, LNCS 1163, pages 125–132. 1996.
-
(1996)
Asiacrypt’96, LNCS
, vol.1163
, pp. 125-132
-
-
Michels, M.1
Horster, P.2
-
17
-
-
0002986502
-
Fault tolerant anonymous channel
-
W. Ogata, K. Kurosawa, K. Sako, and K. Takatani. Fault tolerant anonymous channel. ICICS’98, LNCS 1334, pages 440–444. 1998.
-
(1998)
ICICS’98, LNCS
, vol.1334
, pp. 440-444
-
-
Ogata, W.1
Kurosawa, K.2
Sako, K.3
Takatani, K.4
-
18
-
-
85027158725
-
Efficient anonymous channel and all/nothing election scheme
-
C. Park, K. Itoh, and K. Kurosawa. Efficient anonymous channel and all/nothing election scheme. Eurocrypt’93, LNCS 765, pages 248–259. 1994.
-
(1994)
Eurocrypt’93, LNCS
, vol.765
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
19
-
-
84948967487
-
Breaking an efficient anonymous channel
-
B. Pfitzmann. Breaking an efficient anonymous channel. Eurocrypt’94, LNCS 950, pages 339–348. 1995.
-
(1995)
Eurocrypt’94, LNCS
, vol.950
, pp. 339-348
-
-
Pfitzmann, B.1
-
20
-
-
85032859691
-
How to break the direct RSA implementation of MIXes
-
B. Pfitzmann and A. Pfitzmann. How to break the direct RSA implementation of MIXes. Eurocrypt’89, LNCS 434, pages 373–381. 1989.
-
(1989)
Eurocrypt’89, LNCS
, vol.434
, pp. 373-381
-
-
Pfitzmann, B.1
Pfitzmann, A.2
-
21
-
-
84937489760
-
The efficient reductions between the decision Diffie-Hellman problem and related problems
-
July
-
T. Saitoh. The efficient reductions between the decision Diffie-Hellman problem and related problems. In the joint meeting of SCI2000 and ISAS2000, July 2000. available from the author.
-
(2000)
In the Joint Meeting of SCI2000 and ISAS2000
-
-
Saitoh, T.1
-
22
-
-
84957356080
-
Receipt-free mix-type voting scheme—a practical solution to the implementation of a voting booth—Eurocrypt’95
-
K. Sako and J. Kilian. Receipt-free mix-type voting scheme—a practical solution to the implementation of a voting booth—Eurocrypt’95, LNCS 921, pages 393–403. 1995.
-
(1995)
LNCS
, vol.921
, pp. 393-403
-
-
Sako, K.1
Kilian, J.2
-
23
-
-
84948976239
-
Using hash functions as a hedge against chosen ciphertext attack
-
V. Shoup. Using hash functions as a hedge against chosen ciphertext attack. Eurocrypt 2000, LNCS 1807, pages 275–288. 2000.
-
(2000)
Eurocrypt 2000, LNCS
, vol.1807
, pp. 275-288
-
-
Shoup, V.1
-
24
-
-
84888872516
-
Securing threshold cryptosystems against chosen ciphertext attack
-
V. Shoup and R. Gennaro. Securing threshold cryptosystems against chosen ciphertext attack. Eurocrypt’98, LNCS 1403, pages 1–16. 1998.
-
(1998)
Eurocrypt’98, LNCS
, vol.1403
, pp. 1-16
-
-
Shoup, V.1
Gennaro, R.2
-
25
-
-
84958979582
-
On the security of El Gamal based encryption
-
Y. Tsiounis and M. Yung. On the security of El Gamal based encryption. PKC’98, LNCS 1431, pages 117–134. 1998.
-
(1998)
PKC’98, LNCS
, vol.1431
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
|