-
1
-
-
0023985196
-
RSA and Rabin Functions: Certain Parts are as Hard as the Whole
-
April
-
W. Alexi, B. Chor, O. Goldreich and C. Schnorr.RSA and Rabin Functions: Certain Parts are as Hard as the Whole. In SIAM Journal of Computing, volume 17, n. 2, pages 194-209, April 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 194-209
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.4
-
4
-
-
0010364857
-
-
Tech. Report No. UCB/CSD 84/186. Computer Science Division (EECS), University of California, Berkeley, CA. June
-
E. Bach, Discrete Logarithms and Factoring. Tech. Report No. UCB/CSD 84/186. Computer Science Division (EECS), University of California, Berkeley, CA. June 1984.
-
(1984)
Discrete Logarithms and Factoring.
-
-
Bach, E.1
-
5
-
-
33645593695
-
Plug and Play Encryption
-
D. Beaver, Plug and Play Encryption, Crypto 97, pp. 75-89.
-
Crypto
, vol.97
, pp. 75-89
-
-
Beaver, D.1
-
6
-
-
85048601848
-
Cryptographic protocols provably secure against dynamic adversaries
-
Springer-Verlag
-
D. Beaver and S. Haber, Cryptographic protocols provably secure against dynamic adversaries, EuroCrypt 92, Springer-Verlag, 1993, 307-323.
-
(1993)
Eurocrypt 92
, pp. 307-323
-
-
Beaver, D.1
Haber, S.2
-
7
-
-
85062838317
-
Safeguarding Cryptographic Keys
-
G.R. Blakley, Safeguarding Cryptographic Keys, AFIPS Con. Proc (v. 48), 1979, 313-317.
-
(1979)
AFIPS Con. Proc
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
9
-
-
0002181960
-
Digital Multisignatures
-
Claredon Press, (Eds. H. Baker and F. Piper)
-
C. Boyd, Digital Multisignatures, IMA Conference on Cryptography and Coding, Claredon Press, 241-246, (Eds. H. Baker and F. Piper), 1986.
-
(1986)
IMA Conference on Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
10
-
-
84958639277
-
Efficient Generation of Shared RSA Keys
-
D. Boneh and M. Franklin, Efficient Generation of Shared RSA Keys, Crypto 97, pp. 425-439.
-
Crypto 97
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
0029723583
-
Adaptively Secure Multiparty Computation
-
R. Canetti, U. Feige, O. Goldreich, and M. Naor, Adaptively Secure Multiparty Computation, ACM STOC 96, 639-648.
-
ACM STOC
, vol.96
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
12
-
-
84957083549
-
Adaptive Security for Threshold Cryptosystems
-
R. Canetti, R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Adaptive Security for Threshold Cryptosystems. In CRYPTO 99, pp. 98-115.
-
In CRYPTO 99
, pp. 98-115
-
-
Canetti, R.1
Gennaro, R.2
Jarecki, S.3
Krawczyk, H.4
Rabin, T.5
-
13
-
-
84984842401
-
Maintaining Security in the presence of transient faults
-
Springer-Verlag
-
R. Canetti and A. Herzberg, Maintaining Security in the presence of transient faults, Crypto 94, Springer-Verlag, 1994, pp.425-438.
-
(1994)
Crypto 94
, pp. 425
-
-
Canetti, R.1
Herzberg, A.2
-
14
-
-
0000182415
-
A Measure of the asymptotic efficiency for tests of a hypothesis based on the sum of observations
-
H. Chernoff, A Measure of the asymptotic efficiency for tests of a hypothesis based on the sum of observations, Annals of Mathematical Statistics, 23:493-509, 1952.
-
(1952)
Annals of Mathematical Statistics
, vol.23
, pp. 493
-
-
Chernoff, H.1
-
15
-
-
0022188127
-
A robust and verifiable cryptographically secure election scheme
-
J. Cohen and M. Fischer, A robust and verifiable cryptographically secure election scheme, FOCS 85.
-
FOCS 85
-
-
Cohen, J.1
Fischer, M.2
-
16
-
-
0027961556
-
How to Share a Function Securely
-
First version May 9
-
De Santis, Y. Desmedt, Y. Frankel, and M. Yung, How to Share a Function Securely, ACM STOC 94, pp. 522-533. (First version May 92).
-
ACM STOC 94
, pp. 522-533
-
-
De Santisdesmedt, Y.1
Frankel, Y.2
Yung, M.3
-
18
-
-
0000266745
-
Shared generation of authenticators and signatures
-
Springer-Verlag LNCS 576
-
Y. Desmedt and Y. Frankel, Shared generation of authenticators and signatures, Crypto 91, Springer-Verlag LNCS 576, 1992, pp. 307-315.
-
(1992)
Crypto 91
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
19
-
-
0023538330
-
A Practical Scheme for Non-Interactive Verifiable Secret Sharing
-
P. Feldman, A Practical Scheme for Non-Interactive Verifiable Secret Sharing, Proc. of the 28th IEEE FOCS, pp. 427-437, 1987
-
(1987)
Proc. Of the 28Th IEEE FOCS
, pp. 427-437
-
-
Feldman, P.1
-
20
-
-
0039241746
-
A practical protocol for large group oriented networks
-
Springer-Verlag LNCS 773
-
Y. Frankel, A practical protocol for large group oriented networks, Euro-crypt’89, Springer-Verlag LNCS 773, pp. 56-61.
-
Euro-crypt’89
, pp. 56-61
-
-
Frankel, Y.1
-
22
-
-
0029713931
-
Witness-based Cryptographic Program Checking and Robust Function Sharing
-
Y. Frankel, P. Gemmell, and M. Yung, Witness-based Cryptographic Program Checking and Robust Function Sharing Proc. of STOC, 1996, pp. 499-508.
-
(1996)
Proc. Of STOC
, pp. 499-508
-
-
Frankel, Y.1
Gemmell, P.2
Yung, M.3
-
25
-
-
84937412626
-
Adaptively-secure distributed public-key systems
-
Y. Frankel, P. D. MacKenzie, and M. Yung. Adaptively-secure distributed public-key systems. ESA 99, July 99.
-
ESA 99
, Issue.July
, pp. 99
-
-
Frankel, Y.1
Mackenzie, P.D.2
Yung, M.3
-
29
-
-
2442649276
-
Secure and Efficient Digital Coin
-
Springer Verlag LNCS
-
M. Franklin and M. Yung, Secure and Efficient Digital Coin, ICALP 93, Springer Verlag LNCS.
-
ICALP 93
-
-
Franklin, M.1
Yung, M.2
-
30
-
-
0024716009
-
Minimum-Knowledge Interactive Proofs for Decision Problems
-
Previous version in FOCS 85
-
Z. Galil, S. Haber, and M. Yung, Minimum-Knowledge Interactive Proofs for Decision Problems, SIAM Journal on Computing, vol. 18, n.4, pp. 711-739, 1989. (Previous version in FOCS 85).
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.4
, pp. 711-739
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
31
-
-
0000318410
-
Robust Threshold, DSS Signatures
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Robust Threshold, DSS Signatures, Eurocrypt 96, pp. 354-371.
-
Eurocrypt
, vol.96
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
32
-
-
0141484057
-
Robust and Efficient Sharing of RSA
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Robust and Efficient Sharing of RSA, Crypto 96, pp. 157-172.
-
Crypto
, vol.96
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
34
-
-
84937429651
-
How to Cope with Perpetual Leakage, or: Proactive Secret Sharing
-
Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, How to Cope with Perpetual Leakage, or: Proactive Secret Sharing, Crypto 95, pp. 339-352.
-
Crypto
, vol.95
, pp. 339-352
-
-
Herzbergjarecki, S.1
Krawczyk, H.2
Yung, M.3
-
35
-
-
0030646698
-
Proactive public key and signature systems
-
April
-
Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung, Proactive public key and signature systems, The 4-th ACM Symp. on Comp. and Comm. Security. April 1997.
-
(1997)
The 4-Th ACM Symp. On Comp. and Comm. Security
-
-
Herzbergjakobsson, M.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
36
-
-
84937446549
-
-
M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung, Proactive RSA for constant shareholders, manuscript.
-
Proactive RSA for Constant Shareholders, Manuscript
-
-
Jakobsson, M.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
37
-
-
84948968753
-
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures
-
S. Jarecki and A. Lysyanskaya, Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures. In Eurocrypt 2000, pp. 221-242.
-
(2000)
In Eurocrypt
, pp. 221-242
-
-
Jarecki, S.1
Lysyanskaya, A.2
-
40
-
-
84982943258
-
Non-interactive and information theoretic secure verifiable secret sharing
-
T.P. Pedersen, Non-interactive and information theoretic secure verifiable secret sharing, Crypto 91, pp. 129-140.
-
Crypto
, vol.91
, pp. 129-140
-
-
Pedersen, T.P.1
-
41
-
-
84957689308
-
A Simplified Approach to Threshold and Proactive RSA
-
T. Rabin. A Simplified Approach to Threshold and Proactive RSA. In Crypto 98, pp. 89-104.
-
In Crypto 98
, pp. 89-104
-
-
Rabin, T.1
-
42
-
-
0017930809
-
A Method for Obtaining Digital Signature and Public Key Cryptosystems
-
R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signature and Public Key Cryptosystems, Comm. of the ACM, 21 (1978), pp. 120-126.
-
(1978)
Comm. Of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
43
-
-
0018545449
-
How to share a secret
-
Shamir. How to share a secret, Comm. of the ACM, 22 (1979), pp. 612-613.
-
(1979)
Comm. Of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
44
-
-
84948954277
-
Practical Threshold Signatures
-
V. Shoup. Practical Threshold Signatures. In Eurocrypt 2000, pp. 207-220.
-
(2000)
In Eurocrypt
, pp. 207-220
-
-
Shoup, V.1
|