-
2
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Design- ing Efficient Protocols
-
ACM Press
-
M. Bellare and P. Rogaway, Random Oracles are Practical: A Paradigm for Design- ing Efficient Protocols, In Proceedings of the First CCS, ACM Press, pp. 62-73, 1993.
-
(1993)
Proceedings of the First CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84957375076
-
A Secure And Optimally Effi- cient Multi-Authority Election Scheme
-
Springer-Verlag
-
R. Cramer, R. Gennaro and B. Schoenmakers, A Secure And Optimally Effi- cient Multi-Authority Election Scheme, LNCS 1233, Proceedings of Eurocrypt'97, Springer-Verlag, pp. 103-118, 1997.
-
(1997)
Proceedings of Eurocrypt'97
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
5
-
-
0017018484
-
New Directions in Cryptography
-
W. Diffie and M. Hellman, New Directions in Cryptography, IEEE Transaction on Information Theory, IT-22,6, pp. 644-654, 1995.
-
(1995)
IEEE Transaction on Information Theory, IT-22
, vol.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
6
-
-
0003763066
-
-
Cryptography, World Scientiffic Publishing
-
C. Ding, D. Pei and A. Salomaa, Chinese Remainder Theorem - Applications in Computing, Coding, Cryptography, World Scientiffic Publishing, 1996.
-
(1996)
Chinese Remainder Theorem - Applications in Computing, Coding
-
-
Ding, C.1
Pei, D.2
Salomaa, A.3
-
7
-
-
84874800178
-
A Public-Key Cryptosystem an a Signature Scheme Based on Discrete Logarithms
-
T. ElGamal, A Public-Key Cryptosystem an a Signature Scheme Based on Discrete Logarithms, IEEE Trans. on Information Theory, IT-31, pp. 469-472, 1985.
-
(1985)
IEEE Trans. on Information Theory, IT-31
, pp. 469-472
-
-
Elgamal, T.1
-
8
-
-
0002443418
-
Locally Random Reductions in Interactive Complexity Theory
-
American Mathematical Society, Providence
-
J. Feigenbaum, Locally Random Reductions in Interactive Complexity Theory, in Advances in Computational Complexity Theory, DIMACS Series on Discrete Mathematics and Theoretical Computer Science, vol. 13, American Mathematical Society, Providence, pp. 73-98, 1993.
-
(1993)
Advances in Computational Complexity Theory, DIMACS Series on Discrete Mathematics and Theoretical Computer Science
, vol.13
, pp. 73-98
-
-
Feigenbaum, J.1
-
9
-
-
0021409284
-
Probabilistic Encryption
-
S. Goldwasser and S. Micali, Probabilistic Encryption, JCSS Vol. 28 No 2, pp. 270-299, 1984.
-
(1984)
JCSS
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
10
-
-
85029478766
-
New Public-Key Schemes based on Elliptic Curves over the ring Zn
-
Springer-Verlag
-
K. Koyama, U. Maurer, T. Okamoto and S. Vanstone, New Public-Key Schemes based on Elliptic Curves over the ring Zn, LNCS 576, Proceedings of Crypto'91, Springer-Verlag, pp. 252-266, 1992.
-
(1992)
Proceedings of Crypto'91
, vol.576
, pp. 252-266
-
-
Koyama, K.1
Maurer, U.2
Okamoto, T.3
Vanstone, S.4
-
11
-
-
85033537496
-
Public Quadratic Polynomial-Tuples for Efficient Signature-Veri_cation and Message-Encryption
-
Springer-Verlag
-
T. Matsumoto and H. Imai, Public Quadratic Polynomial-Tuples for Efficient Signature-Veri_cation and Message-Encryption, LNCS 330, Proceedings of Euro- crypt'88, Springer-Verlag, pp. 419-453, 1988.
-
(1988)
Proceedings of Euro- Crypt'88
, vol.330
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
13
-
-
0018019325
-
Hiding Information and Signatures in Trapdoor Knap- sacks
-
R. Merkle and M. Hellman, Hiding Information and Signatures in Trapdoor Knap- sacks, IEEE Trans. on Information Theory, Vol. 24, pp. 525-530, 1978.
-
(1978)
IEEE Trans. on Information Theory
, vol.24
, pp. 525-530
-
-
Merkle, R.1
Hellman, M.2
-
14
-
-
0024139776
-
A Key Distribution System Equivalent to Factoring
-
K. McCurley, A Key Distribution System Equivalent to Factoring, Journal of Cryp- tology, Vol. 1, pp. 95-105, 1988.
-
(1988)
Journal of Cryp- Tology
, vol.1
, pp. 95-105
-
-
McCurley, K.1
-
16
-
-
84957622577
-
A New Public-Key Cryptosystem Based on Higher Residues
-
Springer-Verlag
-
D. Naccache and J. Stern, A New Public-Key Cryptosystem Based on Higher Residues, LNCS 1403, Advances in Cryptology, Proceedings of Eurocrypt'98, Springer-Verlag, pp. 308-318, 1998.
-
(1998)
Advances in Cryptology, Proceedings of Eurocrypt'98
, vol.1403
, pp. 308-318
-
-
Naccache, D.1
Stern, J.2
-
17
-
-
84957366256
-
A New Public-Key Cryptosystem
-
Springer-Verlag
-
D. Naccache and J. Stern, A New Public-Key Cryptosystem, LNCS 1233, Advances in Cryptology, Proceedings of Eurocrypt'97, Springer-Verlag, pp. 27-36, 1997.
-
(1997)
Proceedings of Eurocrypt'97
, vol.1233
, pp. 27-36
-
-
Naccache, D.1
Stern, J.2
-
18
-
-
84957660976
-
Cryptanalysis of the Ajtai-Dwork Cryptosystem
-
Springer-Verlag
-
P. Nguyen and J. Stern, Cryptanalysis of the Ajtai-Dwork Cryptosystem, LNCS 1462, Proceedings of Crypto'98, Springer-Verlag, pp. 223-242, 1998.
-
(1998)
Proceedings of Crypto'98
, vol.1462
, pp. 223-242
-
-
Nguyen, P.1
Stern, J.2
-
19
-
-
84956852274
-
A New Public-Key Cryptosystem as secure as Factoring
-
Springer-Verlag
-
T. Okamoto and S. Uchiyama, A New Public-Key Cryptosystem as secure as Factoring, LNCS 1403, Advances in Cryptology, Proceedings of Eurocrypt'98, Springer-Verlag, pp. 308-318, 1998.
-
(1998)
Advances in Cryptology, Proceedings of Eurocrypt'98
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
22
-
-
0342430954
-
Trapdoor One-Way Permutations and Multivariate Poly- nomials
-
Springer-Verlag
-
J. Patarin and L. Goubin, Trapdoor One-Way Permutations and Multivariate Poly- nomials, LNCS 1334, Proceedings of ICICS'97, Springer-Verlag, pp. 356-368, 1997.
-
(1997)
Proceedings of ICICS'97
, vol.1334
, pp. 356-368
-
-
Patarin, J.1
Goubin, L.2
-
23
-
-
0030123384
-
Faster Factoring of Integers of a Special Form
-
R. Peralta and E. Okamoto, Faster Factoring of Integers of a Special Form, IEICE, Trans. Fundamentals, E79-A, Vol. 4, pp. 489-493, 1996.
-
(1996)
IEICE, Trans. Fundamentals, E79-A
, vol.4
, pp. 489-493
-
-
Peralta, R.1
Okamoto, E.2
-
25
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, Vol. 21, No 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
28
-
-
0031190749
-
Elliptic Curve Cryptosystem Using Curves of Smooth Order Over the Ring Zn
-
July
-
S. Vanstone and R. Zuccherato, Elliptic Curve Cryptosystem Using Curves of Smooth Order Over the Ring Zn, IEEE Trans. Inf. Theory, Vol. 43, No 2, July 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.2
-
-
Vanstone, S.1
Zuccherato, R.2
-
29
-
-
84957701870
-
Cryptanalysis of the Chor-Rivest Cryptosystem
-
Springer-Verlag
-
S. Vaudenay, Cryptanalysis of the Chor-Rivest Cryptosystem, LNCS 1462, Pro- ceedings of Crypto'98, Springer-Verlag, pp. 243-256, 1998.
-
(1998)
Pro- Ceedings of Crypto'98
, vol.1462
, pp. 243-256
-
-
Vaudenay, S.1
-
30
-
-
85034642277
-
Some Public-Key Crypto-Functions as Intractable as Factorization
-
Springer-Verlag
-
H. Williams, Some Public-Key Crypto-Functions as Intractable as Factorization, LNCS 196, Proceedings of Crypto'84, Springer-Verlag, pp. 66-70, 1985.
-
(1985)
Proceedings of Crypto'84
, vol.196
, pp. 66-70
-
-
Williams, H.1
|