-
1
-
-
0011560546
-
The transitive reduction of a directed graph. SIAM
-
A. V. Aho, M. R. Garey, and J. D. Ullman. The transitive reduction of a directed graph. SIAM J. Comput., 1:131–137, 1972.
-
(1972)
J. Comput
, vol.1
, pp. 131-137
-
-
Aho, A.V.1
Garey, M.R.2
Ullman, J.D.3
-
2
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Kaisa Nyberg, editor, Springer
-
Matt Blaze, Gerrit Bleumer, and Martin Strauss. Divertible protocols and atomic proxy cryptography. In Kaisa Nyberg, editor, Proceedings EUROCRYPT’98, pages 127–144. Springer, 1998.
-
(1998)
Proceedings EUROCRYPT’98
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
3
-
-
84947955350
-
Cryptographically strong undeniable signatures, unconditionally secure for the signer
-
J. Feigenbaum, editor, Springer, Lecture Notes in Computer Science No. 576
-
D. Chaum, E. van Heijst, and B. Pfitzmann. Cryptographically strong undeniable signatures, unconditionally secure for the signer. In J. Feigenbaum, editor, Proceedings CRYPTO’91, pages 470–484. Springer, 1992. Lecture Notes in Computer Science No. 576.
-
(1992)
Proceedings CRYPTO’91
, pp. 470-484
-
-
Chaum, D.1
Van Heijst, E.2
Pfitzmann, B.3
-
4
-
-
0020915882
-
Blind signatures for untraceable payments
-
R. L. Rivest, A. Sherman, and D. Chaum, editors, New York, Plenum Press
-
David Chaum. Blind signatures for untraceable payments. In R. L. Rivest, A. Sherman, and D. Chaum, editors, Proceedings CRYPTO 82, pages 199–203, New York, 1983. Plenum Press.
-
(1983)
Proceedings CRYPTO 82
, pp. 199-203
-
-
Chaum, D.1
-
5
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
David Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030–1044, Oct 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
7
-
-
85028450627
-
Non-malleable cryptography
-
ACM
-
D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. In Proc. STOC’91, pages 542–552. ACM, 1991.
-
(1991)
Proc. STOC’91
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
8
-
-
85034638281
-
Encrypting problem instances: Or…can you take advantage of someone without having to trust him?
-
H. C. Williams, editor, Springer, Lecture Notes in Computer Science No
-
Joan Feigenbaum. Encrypting problem instances: Or…can you take advantage of someone without having to trust him? In H. C. Williams, editor, Proceedings CRYPTO 85, pages 477–488. Springer, 1986. Lecture Notes in Computer Science No. 218.
-
(1986)
Proceedings CRYPTO 85
, pp. 477-488
-
-
Feigenbaum, J.1
-
9
-
-
17144400054
-
Open questions, talk abstracts, and summary of discussions
-
Joan Feigenbaum and Michael Merritt. Open questions, talk abstracts, and summary of discussions. In DIMACS Series in Discrete Mathematics and Theoretical Computer Science, volume 2, pages 1–45, 1991.
-
(1991)
DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, vol.2
, pp. 1-45
-
-
Feigenbaum, J.1
Merritt, M.2
-
10
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM, 17(2):281–308, April 1988.
-
(1988)
SIAM
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
11
-
-
84944905011
-
Homomorphic signature schemes
-
Springer, Lecture Notes in Computer Science No. 2271 (This Volume)
-
Robert Johnson, David Molnar, Dawn Song, and David Wagner. Homomorphic signature schemes. In Topics in Cryptology—CT-RSA 2002, pages 244–262. Springer, 2002. Lecture Notes in Computer Science No. 2271 (This Volume).
-
(2002)
Topics in Cryptology—CT-RSA 2002
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Song, D.3
Wagner, D.4
-
13
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
J. Feigenbaum, editor, Springer, Lecture Notes in Computer Science No. 576
-
T.P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, Proceedings CRYPTO’91, pages 129–140. Springer, 1992. Lecture Notes in Computer Science No. 576.
-
(1992)
Proceedings CRYPTO’91
, pp. 129-140
-
-
Pedersen, T.P.1
-
14
-
-
0005301490
-
On data banks and privacy homomorphisms
-
R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, editors, Academic Press
-
Ronald L. Rivest, Leonard Adleman, and Michael L. Dertouzos. On data banks and privacy homomorphisms. In R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, editors, Foundations of Secure Computation, pages 169–180. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 169-180
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
|