-
2
-
-
84958599141
-
Plug and play encryption
-
Bea97, Berlin, Springer
-
Bea97. D. Beaver. Plug and play encryption. In Crypto ’97, pages 75–89, Berlin, 1997. Springer. LNCS Vol. 1294.
-
(1997)
Crypto ’97
, vol.1294
, pp. 75-89
-
-
Beaver, D.1
-
5
-
-
85048601848
-
Cryptographic protocols provably secure against dynamic adversaries
-
BH92, Berlin, Springer
-
BH92. D. Beaver and S. Haber. Cryptographic protocols provably secure against dynamic adversaries. In EuroCrypt ’92, pages 307–323, Berlin, 1992. Springer. LNCS Vol. 658.
-
(1992)
Eurocrypt ’92
, vol.658
, pp. 307-323
-
-
Beaver, D.1
Haber, S.2
-
7
-
-
84948986458
-
Optimal asymmetric encryption
-
BR95, Berlin, Springer
-
BR95. M. Bellare and P. Rogaway. Optimal asymmetric encryption. In EuroCrypt ’94, pages 92–111, Berlin, 1995. Springer. LNCS Vol. 950.
-
(1995)
Eurocrypt ’94
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Can00, winter
-
Can00. Ran Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143–202, winter 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
9
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Can01, IEEE
-
Can01. Ran Canetti. Universally composable security: A new paradigm for cryptographic protocols. In 42th Annual Symposium on Foundations of Computer Science. IEEE, 2001.
-
(2001)
42Th Annual Symposium on Foundations of Computer Science
-
-
Canetti, R.1
-
11
-
-
0029723583
-
Adaptively secure multi-party computation
-
CFGN96, Philadelphia, Pennsylvania
-
CFGN96. Ran Canetti, Uri Feige, Oded Goldreich, and Moni Naor. Adaptively secure multi-party computation. In Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, pages 639–648, Philadelphia, Pennsylvania, 22–24 May 1996.
-
(1996)
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
12
-
-
0031619016
-
The random oracle methodology, revisited (Preliminary version)
-
CGH98, Dallas, TX, USA
-
CGH98. Ran Canetti, Oded Goldreich, and Shai Halevi. The random oracle methodology, revisited (preliminary version). In Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, pages 209–218, Dallas, TX, USA, 24–26 May 1998.
-
(1998)
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
13
-
-
84974602942
-
Improved non-committing encryption schemes based on a general complexity assumption
-
DN00, Berlin, Springer
-
DN00. Ivan Damgård and Jesper B. Nielsen. Improved non-committing encryption schemes based on a general complexity assumption. In Crypto 2000, pages 432–450, Berlin, 2000. Springer. LNCS Vol. 1880.
-
(2000)
Crypto 2000
, vol.1880
, pp. 432-450
-
-
Damgård, I.1
Nielsen, J.B.2
-
14
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
FS86, Berlin, Springer
-
FS86. A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In Crypto ’86, pages 186–194, Berlin, 1986. Springer. LNCS Vol. 263.
-
(1986)
Crypto ’86
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
15
-
-
85031905507
-
On the composition of zero knowledge proof systems
-
GK90, Berlin, Springer
-
GK90. O. Goldreich and H. Krawczyk. On the composition of zero knowledge proof systems. In Proceedings of ICALP 90, Berlin, 1990. Springer. LNCS Vol. 443.
-
(1990)
Proceedings of ICALP 90
, vol.443
-
-
Goldreich, O.1
Krawczyk, H.2
-
16
-
-
84880904783
-
OAEP reconsidered
-
Sho01, Berlin, Springer
-
Sho01. Victor Shoup. OAEP reconsidered. In Crypto 2001, pages 239–259, Berlin, 2001. Springer. LNCS Vol. 2139.
-
(2001)
Crypto 2001
, vol.2139
, pp. 239-259
-
-
Shoup, V.1
|