-
1
-
-
0034771832
-
Practical Multi-Candidate Election System
-
O. Baudron, P.A. Fouque, D. Pointcheval, G. Poupard, and J. Stern. Practical Multi-Candidate Election System. In PODC’01. ACM, 2001.
-
(2001)
PODC’01. ACM
-
-
Baudron, O.1
Fouque, P.A.2
Pointcheval, D.3
Poupard, G.4
Stern, J.5
-
2
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computing
-
M. Ben-Or, S. Goldwasser, and A. Widgerson. Completeness theorems for noncryptographic fault-tolerant distributed computing. In Proceedings of the 20th STOC, ACM, pages 1–10, 1988.
-
(1988)
Proceedings of the 20Th STOC, ACM, Pages 1–10
-
-
Ben-Or, M.1
Goldwasser, S.2
Widgerson, A.3
-
3
-
-
0005275170
-
-
Technical report, University of Waterloo, Canada, February, CORR-98-19
-
S. Blackburn, S. Blake-Wilson, S. Galbraith, and M. Burmester. Shared Generation of Shared RSA Keys. Technical report, University of Waterloo, Canada, February 1998. CORR-98-19.
-
(1998)
Shared Generation of Shared RSA Keys
-
-
Blackburn, S.1
Blake-Wilson, S.2
Galbraith, S.3
Burmester, M.4
-
4
-
-
84958639277
-
Efficient Generation of Shared RSA keys
-
Springer-Verlag
-
D. Boneh and M. Franklin. Efficient Generation of Shared RSA keys. In Crypto’97, LNCS 1233, pages 425–439. Springer-Verlag, 1997.
-
(1997)
Crypto’97, LNCS 1233
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
0013001552
-
Proactive Security: Long-term Protection Against Break-ins
-
Spring
-
R. Canetti, R. Gennaro, A. Herzberg, and D. Naor. Proactive Security: Long-term Protection Against Break-ins. CryptoBytes, 3(1), Spring 1997.
-
(1997)
Cryptobytes
, vol.3
, Issue.1
-
-
Canetti, R.1
Gennaro, R.2
Herzberg, A.3
Naor, D.4
-
7
-
-
84957712291
-
An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack
-
Springer-Verlag
-
R. Canetti and S. Goldwasser. An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. In Eurorypt’99, LNCS 1592, pages 90–106. Springer-Verlag, 1999.
-
(1999)
Eurorypt’99, LNCS 1592
, pp. 90-106
-
-
Canetti, R.1
Goldwasser, S.2
-
8
-
-
84948954120
-
Computing Inverses over a Shared Secret Modulus
-
Springer-Verlag
-
D. Catalano, R. Gennaro, and S. Halevi. Computing Inverses over a Shared Secret Modulus. In Eurocrypt’00, LNCS 1807, pages 190–207. Springer-Verlag, 2000.
-
(2000)
Eurocrypt’00
, vol.1807
, pp. 190-207
-
-
Catalano, D.1
Gennaro, R.2
Halevi, S.3
-
9
-
-
22144433911
-
Split Knowledge Generation of RSA Parameters
-
Springer-Verlag
-
C. Cocks. Split Knowledge Generation of RSA Parameters. In Cryptography and Coding: 6th IMA Conference, LNCS 1355, pages 89–95. Springer-Verlag, 1997.
-
(1997)
Cryptography and Coding: 6Th IMA Conference
, vol.1355
, pp. 89-95
-
-
Cocks, C.1
-
11
-
-
84867553981
-
A Generalisation, a Simplification and Some Applications of Paillier’s Probabilistic Public-Key System
-
Springer-Verlag
-
I. Damgård and M. Jurik. A Generalisation, a Simplification and Some Applications of Paillier’s Probabilistic Public-Key System. In PKC’01, LNCS 1992, pages 119–136. Springer-Verlag, 2001.
-
(2001)
PKC’01
, vol.1992
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
12
-
-
84945127249
-
Practical Threshold RSA Signatures Without a Trusted Dealer
-
Springer-Verlag
-
I. Damgård and M. Koprowski. Practical Threshold RSA Signatures Without a Trusted Dealer. In Eurocrypt’01, LNCS 2045, pages 152–165. Springer-Verlag, 2001.
-
(2001)
Eurocrypt’01
, vol.2045
, pp. 152-165
-
-
Damgård, I.1
Koprowski, M.2
-
13
-
-
85022187530
-
Shared Generation of Authenticators and Signature
-
Springer-Verlag
-
Y. Desmedt and Y. Frankel. Shared Generation of Authenticators and Signature. In Crypto’91, LNCS 576, pages 457–469. Springer-Verlag, 1991.
-
(1991)
Crypto’91
, vol.576
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
14
-
-
0010333125
-
Sharing Decryption in the Context of Voting or Lotteries
-
Springer-Verlag
-
P. A. Fouque, G. Poupard, and J. Stern. Sharing Decryption in the Context of Voting or Lotteries. In Financial Crypto’00, LNCS. Springer-Verlag, 2000.
-
(2000)
Financial Crypto’00
-
-
Fouque, P.A.1
Poupard, G.2
Stern, J.3
-
15
-
-
84937439482
-
One Round Threshold Discrete-Log Key Generation without Private Channels
-
Springer-Verlag
-
P. A. Fouque and J. Stern. One Round Threshold Discrete-Log Key Generation without Private Channels. In PKC’01, LNCS 1992. Springer-Verlag, 2001.
-
(2001)
PKC’01
, vol.1992
-
-
Fouque, P.A.1
Stern, J.2
-
16
-
-
0031375570
-
Optimal Resilience Proactive Public-Key Cryptosystems
-
Y. Frankel, P. Gemmell, P. MacKenzie, and M. Yung. Optimal Resilience Proactive Public-Key Cryptosystems. In FOCS’97, pages 384–393, 1997.
-
(1997)
FOCS’97
, pp. 384-393
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
17
-
-
84958676203
-
Proactive RSA
-
Y. Frankel, P. Gemmell, P. MacKenzie, and M. Yung. Proactive RSA. In Crypto’97, pages 440–454, 1997.
-
(1997)
Crypto’97
, pp. 440-454
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
18
-
-
0031628726
-
Robust Efficient Distributed RSA Key Generation
-
Y. Frankel, P. MacKenzie, and M. Yung. Robust Efficient Distributed RSA Key Generation. In STOC’98, pages 663–672, 1995.
-
(1995)
STOC’98
, pp. 663-672
-
-
Frankel, Y.1
Mackenzie, P.2
Yung, M.3
-
19
-
-
84947441722
-
Robust and Efficient Sharing of RSA Functions
-
Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and Efficient Sharing of RSA Functions. In Crypto’96, LNCS 1109, pages 157–172. Springer-Verlag, 1996.
-
(1996)
Crypto’96
, vol.1109
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
20
-
-
84947926543
-
Robust Threshold DSS Signatures
-
Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust Threshold DSS Signatures. In Eurocrypt’96, LNCS 1070, pages 425–438. Springer-Verlag, 1996.
-
(1996)
Eurocrypt’96
, vol.1070
, pp. 425-438
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
21
-
-
49049089688
-
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
-
Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. In Eurocrypt’99, LNCS 1592, pages 295–310. Springer-Verlag, 1999.
-
(1999)
Eurocrypt’99
, vol.1592
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
23
-
-
84957104180
-
Two Party RSA Key Generation
-
Springer- Verlag
-
N. Gilboa. Two Party RSA Key Generation. In Crypto’99, LNCS 1666. Springer- Verlag, 1999.
-
(1999)
Crypto’99, LNCS 1666
-
-
Gilboa, N.1
-
24
-
-
84959165880
-
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory
-
123–128. Springer-Verlag
-
L. C. Guillou and J.-J. Quisquater. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. In Eurocrypt’88, LNCS 330, pages 123–128. Springer-Verlag, 1988.
-
(1988)
Eurocrypt’88
, vol.330
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
25
-
-
84937400284
-
Improved Methods to Perform Threshold RSA
-
Springer-Verlag
-
B. King. Improved Methods to Perform Threshold RSA. In Asiacrypt’00, LNCS 1976, pages 359–372. Springer-Verlag, 2000.
-
(2000)
Asiacrypt’00
, vol.1976
, pp. 359-372
-
-
King, B.1
-
26
-
-
84958759867
-
On Threshold RSA-signing with no dealer
-
Springer-Verlag
-
S. Miyazaki, K. Sakurai, and M. Yung. On Threshold RSA-signing with no dealer. In ICICS’99, LNCS 1787. Springer-Verlag, 1999.
-
(1999)
ICICS’99
, vol.1787
-
-
Miyazaki, S.1
Sakurai, K.2
Yung, M.3
-
27
-
-
85030460443
-
A Threshold Cryptosystem without a Trusted Party
-
Springer-Verlag
-
T.P. Pedersen. A Threshold Cryptosystem without a Trusted Party. In Eurocrypt’ 91, LNCS 547, pages 522–526. Springer-Verlag, 1991.
-
(1991)
Eurocrypt’ 91
, vol.547
, pp. 522-526
-
-
Pedersen, T.P.1
-
28
-
-
84966198669
-
On the distribution of pseudoprimes
-
C. Pomerance. On the distribution of pseudoprimes. In Mathematics of Computation, 37(156), pages 587–593, 1981.
-
(1981)
Mathematics of Computation,
, vol.37
, Issue.156
, pp. 587-593
-
-
Pomerance, C.1
-
30
-
-
84947809931
-
Generation of Shared RSA Keys by Two Parties
-
Springer-Verlag
-
G. Poupard and J. Stern. Generation of Shared RSA Keys by Two Parties. In Asiacrypt’98, LNCS 1514, pages 11–24. Springer-Verlag, 1998.
-
(1998)
Asiacrypt’98
, vol.1514
, pp. 11-24
-
-
Poupard, G.1
Stern, J.2
-
31
-
-
84957796827
-
Short Proofs of Knowledge for Factoring
-
Springer-Verlag
-
G. Poupard and J. Stern. Short Proofs of Knowledge for Factoring. In PKC’00, LNCS 1751, pages 147–166. Springer-Verlag, 2000.
-
(2000)
PKC’00
, vol.1751
, pp. 147-166
-
-
Poupard, G.1
Stern, J.2
-
32
-
-
84957689308
-
A Simplified Approach to Threshold and Proactive RSA
-
Springer-Verlag
-
T. Rabin. A Simplified Approach to Threshold and Proactive RSA. In Crypto’98, LNCS 1462, pages 89–104. Springer-Verlag, 1998.
-
(1998)
Crypto’98
, vol.1462
, pp. 89-104
-
-
Rabin, T.1
-
33
-
-
84946835719
-
Finding Four Million Large Random Primes
-
Springer-Verlag
-
R. Rivest. Finding Four Million Large Random Primes. In Crypto’90, LNCS 537, pages 625–626. Springer-Verlag, 1991.
-
(1991)
Crypto’90
, vol.537
, pp. 625-626
-
-
Rivest, R.1
-
34
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
-
February
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2):120–126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
35
-
-
0027961556
-
How to share a function securely
-
ACM
-
A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung. How to share a function securely. In STOC’94, pages 522–533. ACM, 1994.
-
(1994)
STOC’94
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
36
-
-
0018545449
-
How to Share a Secret
-
November
-
A. Shamir. How to Share a Secret. Communications of the ACM, 22:612–613, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
37
-
-
84948954277
-
Practical Threshold Signatures
-
Springer-Verlag
-
V. Shoup. Practical Threshold Signatures. In Eurocrypt’00, LNCS 1807, pages 207–220. Springer-Verlag, 2000.
-
(2000)
Eurocrypt’00
, vol.1807
, pp. 207-220
-
-
Shoup, V.1
-
38
-
-
84888872516
-
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
-
Springer- Verlag, cf. the extended version for the Journal of Cryptology, available at
-
V. Shoup and R. Gennaro. Securing Threshold Cryptosystems against Chosen Ciphertext Attack. In Eurocrypt’98, LNCS 1403, pages 1–16. Springer- Verlag, 1998. cf. the extended version for the Journal of Cryptology, available at http://www.shoup.net/papers/.
-
(1998)
Eurocrypt’98
, vol.1403
, pp. 1-16
-
-
Shoup, V.1
Gennaro, R.2
|