-
1
-
-
60649120007
-
Forward-secure threshold signature schemes
-
AMN01, In David Naccache, editor
-
AMN01. Michel Abdalla, Sara Miner, and Chanathip Namprempre. Forward-secure threshold signature schemes. In David Naccache, editor, Progress in Cryptology – CT-RSA 2001, Lecture Notes in Computer Science2020, 2001
-
(2001)
Progress in Cryptology – CT-RSA 2001
-
-
Abdalla, M.1
Miner, S.2
Namprempre, C.3
-
2
-
-
84937472071
-
Invited lecture
-
And97
-
And97. Ross Anderson. Invited lecture. Fourth Annual Conference on Computer and Communications Security, ACM, 1997
-
(1997)
ACM
-
-
Anderson, R.1
-
3
-
-
79958074367
-
-
BM99, In Michael Wiener, editor, Advances in Cryptology – CRYPTO ’99, ofLecture Notes in Computer Science, Springer-Verlag, 15–19 August, Revised version is available from
-
BM99. Mihir Bellare and Sara Miner. A forward-secure digital signature scheme In Michael Wiener, editor, Advances in Cryptology – CRYPTO ’99, volume 1666 of Lecture Notes in Computer Science, pages 431–448 Springer-Verlag, 15–19 August 1999. Revised version is available from http://www.cs.ucsd.edu/˜mihir/
-
(1999)
A Forward-Secure Digital Signature Scheme
, vol.1666
, pp. 431-448
-
-
Bellare, M.1
Miner, S.2
-
4
-
-
84957360970
-
-
BP97, Walter Fumy, editor, Advances in Cryptology – EUROCRYPT 97, ofLecture Notes in Computer Science, Springer-Verlag, 11–15 May
-
BP97. Niko Bari´c and Birgit Pfitzmann. Collision-free accumulators and failstop signature schemes without trees. In Walter Fumy, editor, Advances in Cryptology – EUROCRYPT 97, volume 1233 of Lecture Notes in Computer Science, pages 480–494. Springer-Verlag, 11–15 May 1997
-
(1997)
Collision-Free Accumulators and Failstop Signature Schemes without Trees
, vol.1233
, pp. 480-494
-
-
Niko, B.1
Pfitzmann, B.2
-
6
-
-
85023809951
-
-
DF89, G. Brassard, editor, Advances in Cryptology – CRYPTO ’89, ofLecture Notes in Computer Science, Springer-Verlag
-
DF89. Yvo Desmedt and Yair Frankel. Threshold cryptosystems. In G. Brassard, editor, Advances in Cryptology – CRYPTO ’89, volume 435 of Lecture Notes in Computer Science, pages 307–315. Springer-Verlag, 1990
-
(1990)
Threshold Cryptosystems
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
8
-
-
3142521500
-
-
DKXY02, In Lars Knudsen, editor, Advances in Cryptology – EUROCRYPT 2002, Lecture Notes in Computer Science Springer-Verlag, 28 April–2 May
-
DKXY02. Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, and Moti Yung. Keyinsulated public key cryptosystems. In Lars Knudsen, editor, Advances in Cryptology – EUROCRYPT 2002, Lecture Notes in Computer Science Springer-Verlag, 28 April–2 May 2002
-
(2002)
Keyinsulated Public Key Cryptosystems
-
-
Dodis, Y.1
Katz, J.2
Shouhuai, X.3
Yung, M.4
-
9
-
-
84958615646
-
-
FO97, ofLecture Notes in Computer Science, Springer-Verlag, 17–21 August
-
FO97. Eiichiro Fujisaki and Tatsuaki Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In Burton S. Kaliski Jr., editor, Advances in Cryptology – CRYPTO ’97, volume 1294 of Lecture Notes in Computer Science, pages 16–30. Springer-Verlag, 17–21 August 1997
-
(1997)
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
, vol.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
11
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
GMR88
-
GMR88. Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281–308, April 1988
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
12
-
-
0023545076
-
-
GMW87, Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, New York City, 25–27 May
-
GMW87. Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pages 218–229, New York City, 25–27 May 1987.
-
(1987)
How to Play Any Mental Game Or a Completeness Theorem for Protocols with Honest Majority
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
13
-
-
84957707067
-
-
GPR98, Hugo Krawczyk, editor, Advances in Cryptology – CRYPTO ’98, ofLecture Notes in Computer Science, Springer-Verlag, 23–27 August
-
GPR98. Oded Goldreich, Birgit Pfitzmann, and Ronald L. Rivest. Self-delegation with controlled propagation – or – what if you lose your laptop. In Hugo Krawczyk, editor, Advances in Cryptology – CRYPTO ’98, volume 1462 of Lecture Notes in Computer Science, pages 153–168. Springer-Verlag, 23–27 August 1998
-
(1998)
Self-Delegation with Controlled Propagation – Or – What If You Lose Your Laptop
, vol.1462
, pp. 153-168
-
-
Goldreich, O.1
Pfitzmann, B.2
Rivest, R.L.3
-
14
-
-
84947558992
-
-
GQ88, Shafi Goldwasser, editor, Advances in Cryptology – CRYPTO ’88, ofLecture Notes in Computer Science, Springer-Verlag
-
GQ88. Louis Claude Guillou and Jean-Jacques Quisquater. A “paradoxical” indentity-based signature scheme resulting from zero-knowledge. In Shafi Goldwasser, editor, Advances in Cryptology – CRYPTO ’88, volume 403 of Lecture Notes in Computer Science, pages 216–231. Springer-Verlag, 1990
-
(1990)
A “paradoxical” Indentity-Based Signature Scheme Resulting from Zero-Knowledge
, vol.403
, pp. 216-231
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
15
-
-
0030646698
-
-
HJJ+97. Amir Herzberg, Markus Jakobsson, Stanis_law Jarecki, Hugo Krawczyk, and Moti Yung, Fourth ACM Conference on Computer and Communication Security, ACM, April 1–4
-
HJJ+97. Amir Herzberg, Markus Jakobsson, Stanis_law Jarecki, Hugo Krawczyk, and Moti Yung. Proactive public key and signature systems. In Fourth ACM Conference on Computer and Communication Security, pages 100– 110. ACM, April 1–4 1997
-
(1997)
Proactive Public Key and Signature Systems
-
-
-
16
-
-
84880879872
-
-
IR01, Joe Kilian, editor, Advances in Cryptology – CRYPTO 2001,, ofLecture Notes in Computer Science, Springer-Verlag, 19–23 August
-
IR01. Gene Itkis and Leonid Reyzin. Forward-secure signatures with optimal signing and verifying. In Joe Kilian, editor, Advances in Cryptology – CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 332–354. Springer-Verlag, 19–23 August 2001
-
(2001)
Forward-Secure Signatures with Optimal Signing and Verifying
, vol.2139
, pp. 332-354
-
-
Itkis, G.1
Reyzin, L.2
-
18
-
-
84937472075
-
-
LR00, Presented by Rivest at the CIS seminar at MIT, 27 October
-
LR00. Anna Lysyanskaya and Ron Rivest. Bepper-based signatures. Presented by Rivest at the CIS seminar at MIT, 27 October 2000
-
(2000)
Bepper-Based Signatures
-
-
Lysyanskaya, A.1
Rivest, R.2
-
19
-
-
0004179384
-
-
Mic96.,., Technical Report MIT/LCS/TM-542b, Massachusetts Institute of Technology, Cambridge, MA, March
-
Mic96. Silvio Micali. Efficient certificate revocation. Technical Report MIT/LCS/TM-542b, Massachusetts Institute of Technology, Cambridge, MA, March 1996
-
(1996)
Efficient Certificate Revocation
-
-
Micali, S.1
-
23
-
-
84927727752
-
-
PS96, Ueli Maurer, editor, Advances in Cryptology – EUROCRYPT 96, ofLecture Notes in Computer Science, Springer-Verlag, 12–16 May
-
PS96. David Pointcheval and Jacques Stern. Security proofs for signature schemes. In Ueli Maurer, editor, Advances in Cryptology – EUROCRYPT 96, volume 1070 of Lecture Notes in Computer Science, pages 387–398. Springer-Verlag, 12–16 May 1996
-
(1996)
Security Proofs for Signature Schemes
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
24
-
-
84958042111
-
-
Riv98., Rafael Hirschfeld, editor, Financial Cryptograph, ofLecture Notes in Computer Science. Springer-Verlag
-
Riv98. Ronald L. Rivest. Can we eliminate certificate revocation lists? In Rafael Hirschfeld, editor, Financial Cryptography, volume 1465 of Lecture Notes in Computer Science. Springer-Verlag, 1998
-
(1998)
Can We Eliminate Certificate Revocation Lists?
, vol.1465
-
-
Rivest, R.L.1
-
25
-
-
38049015677
-
On the generation of cryptographically strong pseudorandom sequences
-
Sha83
-
Sha83. Adi Shamir. On the generation of cryptographically strong pseudorandom sequences. ACM Transactions on Computer Systems, 1(1):38–44, 1983
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.1
, pp. 38-44
-
-
Shamir, A.1
-
26
-
-
0020312165
-
-
Yao82, 23rd Annual Symposium on Foundations of Computer Science, Chicago, Illinois, 3–5 November, IEEE
-
Yao82. A.C. Yao. Protocols for secure computations. In 23rd Annual Symposium on Foundations of Computer Science, pages 160–164, Chicago, Illinois, 3–5 November 1982. IEEE
-
(1982)
Protocols for Secure Computations
, pp. 160-164
-
-
Yao, A.C.1
|