-
1
-
-
0023408117
-
Processing encrypted data
-
Niv Ahituv, Yeheskel Lapid, and Seev Neumann. Processing encrypted data. Communications of the ACM, 30(9):777–780, 1987.
-
(1987)
Communications of the ACM
, vol.30
, Issue.9
, pp. 777-780
-
-
Ahituv, N.1
Lapid, Y.2
Neumann, S.3
-
3
-
-
85024585723
-
Incremental cryptography: The case of hashing and signing
-
Yvo Desmedt, editor, Berlin, Springer-Verlag. Lecture Notes in Computer Science
-
M. Bellare, O. Goldreich, and S. Goldwasser. Incremental cryptography: the case of hashing and signing. In Yvo Desmedt, editor, Advances in Cryptology–CRYPTO’94, pages 216–233, Berlin, 1994. Springer-Verlag. Lecture Notes in Computer Science Volume 839.
-
(1994)
Advances in Cryptology–CRYPTO’94
, vol.839
, pp. 216-233
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
4
-
-
0345350047
-
Incremental cryptography with application to virus protection
-
Berlin, Springer-Verlag
-
M. Bellare, O. Goldreich, and S. Goldwasser. Incremental cryptography with application to virus protection. In FOCS 1995, Berlin, 1995. Springer-Verlag.
-
(1995)
FOCS 1995
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
5
-
-
84947906522
-
The exact security of digital signatures–how to sign with RSA and Rabin
-
Ueli Maurer, editor, Berlin, Springer-Verlag. Lecture Notes in Computer Science
-
M. Bellare and P. Rogaway. The exact security of digital signatures–how to sign with RSA and Rabin. In Ueli Maurer, editor, Advances in Cryptology– EUROCRYPT’96, pages 399–416, Berlin, 1996. Springer-Verlag. Lecture Notes in Computer Science Volume 1070.
-
(1996)
Advances in Cryptology– EUROCRYPT’96
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
0002809150
-
One-way accumulators: A decentralized alternative to digital signatures
-
J.C. Benaloh and M. de Mare. One-way accumulators: A decentralized alternative to digital signatures. In EUROCRYPT’93, 1993.
-
(1993)
EUROCRYPT’93
-
-
Benaloh, J.C.1
De Mare, A.M.2
-
10
-
-
84955604812
-
Algorithms for black-box fields and their application to cryptography
-
Neal Koblitz, editor, Berlin, Springer-Verlag. Lecture Notes in Computer Science
-
D. Boneh and R. J. Lipton. Algorithms for black-box fields and their application to cryptography. In Neal Koblitz, editor, Advances in Cryptology–CRYPTO’96, pages 283–297, Berlin, 1996. Springer-Verlag. Lecture Notes in Computer Science Volume 1109.
-
(1996)
Advances in Cryptology–CRYPTO’96
, vol.1109
, pp. 283-297
-
-
Boneh, D.1
Lipton, R.J.2
-
11
-
-
85034827254
-
On privacy homomorphisms
-
David Chaum and Wyn L. Price, editors, Berlin, Springer-Verlag. Lecture Notes in Computer Science
-
E. F. Brickell and Y. Yacobi. On privacy homomorphisms. In David Chaum and Wyn L. Price, editors, Advances in Cryptology–EUROCRYPT’87, pages 117–126, Berlin, 1987. Springer-Verlag. Lecture Notes in Computer Science Volume 304.
-
(1987)
Advances in Cryptology–EUROCRYPT’87
, vol.304
, pp. 117-126
-
-
Brickell, E.F.1
Yacobi, Y.2
-
13
-
-
22044443106
-
Zero knowledge proofs for finite field arithmetic – or, can zero knowledge be for free?
-
Berlin, Springer-Verlag
-
Cramer and Damgard. Zero knowledge proofs for finite field arithmetic – or, can zero knowledge be for free? In Advances in Cryptology–CRYPTO’98, Berlin, 1998. Springer-Verlag.
-
(1998)
Advances in Cryptology–CRYPTO’98
-
-
Cramer1
Damgard2
-
16
-
-
84957661041
-
Secure hash-and-sign signatures without the random oracle
-
Springer-Verlag, Lecture Notes in Computer Science
-
Rosario Gennaro, Shai Halevi, and Tal Rabin. Secure hash-and-sign signatures without the random oracle. In Advances in Cryptology–EUROCRYPT’99, pages 123–139. Springer-Verlag, 1999. Lecture Notes in Computer Science Volume 1592.
-
(1999)
Advances in Cryptology–EUROCRYPT’99
, vol.1592
, pp. 123-139
-
-
Gennaro, R.1
Halevi, S.2
Rabin, T.3
-
19
-
-
84944878224
-
Transitive signature schemes
-
Springer-Verlag, Lecture Notes in Computer Science, (This Volume)
-
S. Micali and R. Rivest. Transitive signature schemes. In Topics in Cryptology– CT-RSA 2002, pages 236–243. Springer-Verlag, 2002. Lecture Notes in Computer Science Volume 2271 (This Volume).
-
(2002)
Topics in Cryptology– CT-RSA 2002
, vol.2271
, pp. 236-243
-
-
Micali, S.1
Rivest, R.2
-
21
-
-
0022793132
-
How to construct random functions
-
October
-
Goldreich Oded, Shafi Goldwasser, and Silvio Micali. How to construct random functions. Journal of the ACM, 33(4):792–807, October 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Oded, G.1
Goldwasser, S.2
Micali, S.3
-
24
-
-
33645412836
-
-
Presented at Cambridge seminar; see
-
R. Rivest. Two new signature schemes. Presented at Cambridge seminar; see http://www.cl.cam.ac.uk/Research/Security/seminars/2000/ rivest-tss.pdf, 2001.
-
(2001)
Two New Signature Schemes
-
-
Rivest, R.1
-
26
-
-
0033309271
-
Non-interactive cryptocomputing in NC 1
-
T. Sander, A Young, and M Yung. Non-interactive cryptocomputing in NC 1. In FOCS’99, 1999.
-
(1999)
FOCS’99
-
-
Sander, T.1
Young, A.2
Yung, M.3
|