-
1
-
-
85032877753
-
Non-interactive oblivious transfer and applications
-
Springer-Verlag
-
M Bellare and S Micali, “Non-interactive oblivious transfer and applications,” Advances in Cryptology - CRYPTO’89, LNCS 435, Springer-Verlag, pp.547-557, 1990.
-
(1990)
Advances in Cryptology - CRYPTO’89, LNCS 435
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
2
-
-
84948951675
-
Noisy Polynomial Interpolation and Noisy Chinese Remaindering
-
Springer-Verlag
-
D Bleichenbacher and P Q Nguyen, “Noisy Polynomial Interpolation and Noisy Chinese Remaindering,” Advances in Cryptology - EUROCRYPT 2000, LNCS 1807, Springer-Verlag, pp.53-69, 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000, LNCS 1807
, pp. 53-69
-
-
Bleichenbacher, D.1
Nguyen, P.Q.2
-
3
-
-
84957085257
-
An Efficient Public Key Traitor Tracing Scheme
-
Springer-Verlag
-
D Boneh and M Franklin, “An Efficient Public Key Traitor Tracing Scheme,” Advances in Cryptology - CRYPTO’99, LNCS 1666, Springer-Verlag, pp.338-353, 1999.
-
(1999)
Advances in Cryptology - CRYPTO’99, LNCS 1666
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
84985922619
-
Tracing Traitors
-
Springer-Verlag
-
B Chor, A Fiat and M Naor, “Tracing Traitors,” Advances in Cryptology - CRYPTO’94, LNCS 839, Springer-Verlag, pp.257-270, 1994.
-
(1994)
Advances in Cryptology - CRYPTO’94, LNCS 839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
7
-
-
84939573910
-
Differential Power Analysis
-
Springer-Verlag
-
P Kocher, J Jaffe and B Jun, “Differential Power Analysis,” Advances in Cryptology - CRYPTO’99, LNCS 1666, Springer-Verlag, pp.388-397, 1999.
-
(1999)
Advances in Cryptology - CRYPTO’99, LNCS 1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
8
-
-
35248866858
-
Optimum Traitor Tracing and Asymmetric Schemes
-
Springer- Verlag
-
K Kurosawa and Y Desmedt, “Optimum Traitor Tracing and Asymmetric Schemes,” Advances in Cryptology - EUROCRYPT’98, LNCS 1403, Springer- Verlag, pp.145-157, 1998.
-
(1998)
Advances in Cryptology - EUROCRYPT’98, LNCS 1403
, pp. 145-157
-
-
Kurosawa, K.1
Desmedt, Y.2
-
9
-
-
84937740421
-
Shift Register Synthesis and BCH Decoding
-
January
-
J L Massey, “Shift Register Synthesis and BCH Decoding,” IEEE Transactions on Information Theory, vol. IT-15, No.1, pp.122-127, January 1969.
-
(1969)
IEEE Transactions on Information Theory
, vol.IT-15
, Issue.1
, pp. 122-127
-
-
Massey, J.L.1
-
11
-
-
84954420982
-
Trials of Traced Traitors
-
Springer-Verlag
-
B Pfitzmann, “Trials of Traced Traitors,” Proc. of Information Hiding, First International Workshop, LNCS 1174, Springer-Verlag, pp.49-64,1996.
-
(1996)
Proc. Of Information Hiding, First International Workshop, LNCS 1174
, pp. 49-64
-
-
Pfitzmann, B.1
-
13
-
-
84937427628
-
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
-
Springer-Verlag
-
T Sander and A Ta-Shma, “Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems,” Proc. of Financial Cryptography: Third International Conference, FC’99, LNCS 1648, Springer-Verlag, pp.46-61, 1999.
-
(1999)
Proc. Of Financial Cryptography: Third International Conference, FC’99, LNCS 1648
, pp. 46-61
-
-
Sander, T.1
Ta-Shma, A.2
-
14
-
-
84890047469
-
Key Preassigned Traceability Schemes for Broadcast Encryption
-
Springer-Verlag
-
D R Stinson and R Wei, “Key Preassigned Traceability Schemes for Broadcast Encryption,” Proc. of SAC’98, LNCS 1556, Springer-Verlag, pp.144-156, 1998.
-
(1998)
Proc. Of SAC’98, LNCS 1556
, pp. 144-156
-
-
Stinson, D.R.1
Wei, R.2
-
17
-
-
84937473812
-
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents
-
April, to be published in LNCS
-
Y. Watanabe, G. Hanaoka and H. Imai, “Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents,” to appear in Proc. of the RSA Conference Cryptographer’s Track, April, 2001 (to be published in LNCS).
-
(2001)
Proc. Of the RSA Conference Cryptographer’s Track
-
-
Watanabe, Y.1
Hanaoka, G.2
Imai, H.3
-
18
-
-
84937473813
-
-
(in Japanese) IEICE Technical Report, ISEC, September
-
Y Watanabe, H Komaki, G Hanaoka and H Imai, “Asymmetric Traitor Tracing based on Oblivious Polynomial Evaluation,” (in Japanese) IEICE Technical Report, ISEC, September, 2000.
-
(2000)
Asymmetric Traitor Tracing Based on Oblivious Polynomial Evaluation
-
-
Watanabe, Y.1
Komaki, H.2
Hanaoka, G.3
Imai, H.4
|