-
1
-
-
0041089975
-
On Hiding Information from an Oracle
-
Aug
-
M. Abadi, J. Feigenbaum and J. Kilian, “On Hiding Information from an Oracle”, Journal of Computer and System Sciences, Vol. 39, no. 1, Aug 1989, pp. 21–50.
-
(1989)
Journal of Computer and System Sciences
, vol.39
, Issue.1
, pp. 21-50
-
-
Abadi, M.1
Feigenbaum, J.2
Kilian, J.3
-
2
-
-
84958948483
-
Hiding Instances in Zero-Knowledge Proof Systems
-
D. Beaver, J. Feigenbaum and V. Shoup, “Hiding Instances in Zero-Knowledge Proof Systems,” CRYPTO’90, pp. 326–338.
-
CRYPTO’90
, pp. 326-338
-
-
Beaver, D.1
Feigenbaum, J.2
Shoup, V.3
-
3
-
-
50849114523
-
Fast Batch Verification for Modular Exponentiation and Digital Signatures
-
M. Bellare, J.A. Garay and T. Rabin, “Fast Batch Verification for Modular Exponentiation and Digital Signatures,” EUROCRYPT’98, 1998, pp. 236–250.
-
(1998)
EUROCRYPT’98
, pp. 236-250
-
-
Bellare, M.1
Garay, J.A.2
Rabin, T.3
-
4
-
-
84898960610
-
Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations
-
M. Ben-Or, S. Goldwasser and A. Wigderson, “Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations”, STOC’88, pp. 1–10.
-
STOC’88
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
0000742754
-
Addition Chain Heuristics
-
J. Bos and M. Coster, “Addition Chain Heuristics,” CRYPTO’89, pp. 400–407.
-
CRYPTO’89
, pp. 400-407
-
-
Bos, J.1
Coster, M.2
-
7
-
-
84957610823
-
Speeding up discrete log and factoring based schemes via precomputations
-
V. Boyko, M. Peinado and R. Venkatesan, “Speeding up discrete log and factoring based schemes via precomputations. EUROCRYPT’98, pp. 221–235.
-
EUROCRYPT’98
, pp. 221-235
-
-
Boyko, V.1
Peinado, M.2
Venkatesan, R.3
-
8
-
-
84867248592
-
Untraceable Off-line Cash in Wallet with Observers
-
S. Brands, “Untraceable Off-line Cash in Wallet with Observers,” CRYPTO’93, pp. 302–318.
-
CRYPTO’93
, pp. 302-318
-
-
Brands, S.1
-
9
-
-
0028381806
-
Parameter Selection for Server-Aided RSA Computation Schemes
-
J. Burns and C.J. Mitchell, “Parameter Selection for Server-Aided RSA Computation Schemes” IEEE Transactions on Computers, Vol. 43, No. 2, 1994, pp. 163–174.
-
(1994)
IEEE Transactions on Computers
, vol.43
, Issue.2
, pp. 163-174
-
-
Burns, J.1
Mitchell, C.J.2
-
10
-
-
84898947315
-
Multiparty Unconditionally Secure Protocols
-
D. Chaum, C. Crépeau and I. Damgård, “Multiparty Unconditionally Secure Protocols”, STOC’98, pp. 11–19.
-
STOC’98
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
11
-
-
0029723583
-
Adaptively Secure Multi-Party Computation
-
R. Canetti, U. Feige, O. Goldreich and M. Naor, “Adaptively Secure Multi-Party Computation”, STOC’96, pp. 639–648.
-
STOC’96
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
13
-
-
0000951613
-
Improved Low-Density Subset Sum Algorithms
-
M.J. Coster, B.A. LaMacchia, A.M. Odlyzko, C.P. Schnorr and J. Stern, “Improved Low-Density Subset Sum Algorithms”, Journal of Computational Complexity, Vol. 2, 1992, pp. 111–128.
-
(1992)
Journal of Computational Complexity
, vol.2
, pp. 111-128
-
-
Coster, M.J.1
Lamacchia, B.A.2
Odlyzko, A.M.3
Schnorr, C.P.4
Stern, J.5
-
14
-
-
0027961556
-
How to Share a Function Securely
-
A. De Santis, Y. Desmedt, Y. Frankel and M. Yung, “How to Share a Function Securely”, STOC’94, pp. 522–533.
-
STOC’94
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
15
-
-
84948958135
-
How to Break a Practical MIX and Design a New One
-
Y. Desmedt and K. Kurosawa, “How to Break a Practical MIX and Design a New One,” EUROCRYPT’00, pp. 557–772.
-
EUROCRYPT’00
, pp. 557-772
-
-
Desmedt, Y.1
Kurosawa, K.2
-
16
-
-
84948968588
-
A Note on One-Prover Instance-Hiding, Zero- Knowledge Proof Systems
-
J. Feigenbaum and R. Ostrovsky, “A Note on One-Prover Instance-Hiding, Zero- Knowledge Proof Systems”, ASIACRYPT’91, pp. 352–359.
-
ASIACRYPT’91
, pp. 352-359
-
-
Feigenbaum, J.1
Ostrovsky, R.2
-
18
-
-
0031628398
-
Simplified VSS and Fast-track Multiparty Computations with Applications to Threshold Cryptography
-
R. Gennaro, M. Rabin and T. Rabin, “Simplified VSS and Fast-track Multiparty Computations with Applications to Threshold Cryptography”, PODC’98, pp. 101–111.
-
PODC’98
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.2
Rabin, T.3
-
21
-
-
0027617773
-
Fast Server-Aided Secret Computation Protocols for Modular Exponentiation
-
S. Kawamura and A. Shimbo, “Fast Server-Aided Secret Computation Protocols for Modular Exponentiation”, IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, 1993, pp. 778–784.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 778-784
-
-
Kawamura, S.1
Shimbo, A.2
-
22
-
-
84957648348
-
Security and Performance of Server-Aided RSA Computation Protocols
-
C.H. Lim and P.J. Lee, “Security and Performance of Server-Aided RSA Computation Protocols,” CRYPTO’95, pp. 70–83.
-
CRYPTO’95
, pp. 70-83
-
-
Lim, C.H.1
Lee, P.J.2
-
23
-
-
84955368946
-
More Flexible Exponentiation With Precomputation
-
C.H. Lim and P.J. Lee, “More Flexible Exponentiation With Precomputation”, CRYPTO’94, pp. 95–107.
-
CRYPTO’94
, pp. 95-107
-
-
Lim, C.H.1
Lee, P.J.2
-
24
-
-
21344491195
-
On Verifiable Implicit Asking Protocols for RSA Computation
-
T. Matsumoto, H. Imai, C.S. Laih and S.M. Yen, “On Verifiable Implicit Asking Protocols for RSA Computation”, AUSCRYPT’92, pp. 296–307.
-
AUSCRYPT’92
, pp. 296-307
-
-
Matsumoto, T.1
Imai, H.2
Laih, C.S.3
Yen, S.M.4
-
25
-
-
85031767993
-
Speeding Up Secret Computations with Insecure Auxiliary Devices
-
T. Matsumoto, K. Kato and H. Imai, “Speeding Up Secret Computations with Insecure Auxiliary Devices”, CRYPTO’88, pp. 497–506.
-
CRYPTO’88
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
26
-
-
84937478347
-
FIPS Publication 186-1: Digital Signature Standard
-
National Institute of Standards and Technology (NIST), “FIPS Publication 186-1: Digital Signature Standard”, December 15, 1998.
-
(1998)
December
, pp. 15
-
-
-
27
-
-
84957072857
-
The Hardness of the Hidden Subset Sum Problem and its Cryptographic Implications
-
P. Nguyen and J. Stern, “The Hardness of the Hidden Subset Sum Problem and its Cryptographic Implications”, Crypto’99, pp. 31–46.
-
Crypto’99
, pp. 31-46
-
-
Nguyen, P.1
Stern, J.2
-
28
-
-
84955578798
-
Attacks on Protocols for Server-Aided RSA Computation
-
B. Pfitzmann and M. Waidner, “Attacks on Protocols for Server-Aided RSA Computation”, EUROCRYPT’92, pp. 153–162.
-
EUROCRYPT’92
, pp. 153-162
-
-
Pfitzmann, B.1
Waidner, M.2
-
29
-
-
0005063381
-
Speeding up Smart Card RSA Computation with Insecure Coprocessors
-
J.-J. Quisquater and M. De Soete, “Speeding up Smart Card RSA Computation with Insecure Coprocessors”, SMART CARD 2000, 1989, pp. 191–197.
-
(2000)
SMART CARD
, vol.1989
, pp. 191-197
-
-
Quisquater, J.-J.1
De Soete, M.2
-
31
-
-
0033309271
-
Non-Interactive Crypto Computing for NC1
-
T. Sander, A. Young and M. Yung, “Non-Interactive Crypto Computing for NC1”, FOCS’99, pp. 554–567.
-
FOCS’99
, pp. 554-567
-
-
Sander, T.1
Young, A.2
Yung, M.3
-
32
-
-
12344258539
-
Efficient Signature Generation for Smart Cards
-
C.-P. Schnorr, “Efficient Signature Generation for Smart Cards,” Journal of Cryptology, Vol. 4, 1991, pp. 161–174.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.-P.1
-
33
-
-
33846200465
-
Lattice Basis Reduction: Improved Practical Algorithms and Solving Subset Sum Problems
-
C.P. Schnorr and M. Euchner, “Lattice Basis Reduction: Improved Practical Algorithms and Solving Subset Sum Problems”, Mathematical Programming 66, 1994, pp. 181–199.
-
(1994)
Mathematical Programming
, vol.66
, pp. 181-199
-
-
Schnorr, C.P.1
Euchner, M.2
-
34
-
-
0009452048
-
Attacking the Chor-Rivest Cryptosystem by Improved Lattice Reduction
-
C.P. Schnorr and H.H. Hörner, “Attacking the Chor-Rivest Cryptosystem by Improved Lattice Reduction”, EUROCRYPT’95, pp. 1–12.
-
EUROCRYPT’95
, pp. 1-12
-
-
Schnorr, C.P.1
Hörner, H.H.2
-
35
-
-
0020312165
-
Protocols for Secure Computations
-
A.C. Yao, “Protocols for Secure Computations”, FOCS’82, pp. 160–164.
-
FOCS’82
, pp. 160-164
-
-
Yao, A.C.1
|