-
1
-
-
84947448528
-
An analysis of the reduction algorithms for binary quadratic forms, Technical Report No. TI-26/97
-
[BB97]. I. Biehl and J. Buchmann, “An analysis of the reduction algorithms for binary quadratic forms”, Technical Report No. TI-26/97, Technische Universitat Darmstadt, (1997).
-
(1997)
Technische Universitat Darmstadt
-
-
Biehl, I.1
Buchmann, J.2
-
2
-
-
84898960610
-
-
[BGW88]. M. Ben-Or, S. Goldwasser and A. Wigderson, “Completeness theorems for non-cryptographic fault tolerant distributed computation”, STOC, (1988), pp.1-10.
-
(1988)
Completeness Theorems for Non-Cryptographic Fault Tolerant Distributed Computation, STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
84958639277
-
-
D. Boneh and M. Franklin, “Efficient generation of shared RSA keys”, CRYPTO’97, LNCS 1294, (1997), Springer, pp.425-439.
-
(1997)
Efficient Generation of Shared RSA Keys, CRYPTO’97, LNCS
, vol.1294
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
84947749920
-
-
D. Boneh and J. Horwitz, “Generating a product of three primes with an unknown factorization”, The third Algorithmic Number Theory Symposium, ANTS III, LNCS 1423, (1998), Springer, pp.237-251.
-
(1998)
Generating a Product of Three Primes with an Unknown Factorization, the Third Algorithmic Number Theory Symposium, ANTS III, LNCS 1423
, pp. 237-251
-
-
Boneh, D.1
Horwitz, J.2
-
5
-
-
0024139987
-
-
J. Buchmann and H. C. Williams, “A key-exchange system based on imaginary quadratic fields”, Journal of Cryptology, 1, (1988), Springer, pp.107-118.
-
(1988)
A Key-Exchange System Based on Imaginary Quadratic Fields, Journal of Cryptology
, vol.1
, pp. 107-118
-
-
Buchmann, J.1
Williams, H.C.2
-
6
-
-
84948954120
-
Computing Inverses over a Shared Secret Modulus
-
[CGH00]. D. Catalano, R. Gennaro, S. Halevi, “Computing Inverses over a Shared Secret Modulus,” EUROCRYPT 2000, LNCS 1807, (2000), pp.190-206.
-
(2000)
EUROCRYPT 2000, LNCS
, vol.1807
, pp. 190-206
-
-
Catalano, D.1
Gennaro, R.2
Halevi, S.3
-
8
-
-
84945127249
-
Practical Threshold RSA Signatures without a Trusted Dealer
-
[DK01]. I. Damgard and M. Koprowski, “Practical Threshold RSA Signatures without a Trusted Dealer,” EUROCRYPT 2001, LNCS 2045, (2001), pp.152-165.
-
(2001)
EUROCRYPT 2001, LNCS
, vol.2045
, pp. 152-165
-
-
Damgard, I.1
Koprowski, M.2
-
9
-
-
84946830669
-
Fully Distributed Threshold RSA under Standard Assumptions
-
[FS01]. P.-A. Fouque and J. Stern, “Fully Distributed Threshold RSA under Standard Assumptions,” ASIACRYPT 2001, LNCS 2248, (2001), pp.310-330.
-
(2001)
ASIACRYPT 2001, LNCS
, vol.2248
, pp. 310-330
-
-
Fouque, P.-A.1
Stern, J.2
-
11
-
-
84948967120
-
A NICE cryptanalysis
-
[JJ99]. E. Jaulmes and A. Joux, “A NICE cryptanalysis”, EUROCRYPT 2000, LNCS 1807, (2000), pp.382-391.
-
(2000)
EUROCRYPT 2000, LNCS
, vol.1807
, pp. 382-391
-
-
Jaulmes, E.1
Joux, A.2
-
12
-
-
84947448529
-
-
LiDIA - A library for computational number theory. Technische Universitat Darmstadt, Germany
-
LiDIA - A library for computational number theory. Technische Universitat Darmstadt, Germany.
-
-
-
-
13
-
-
0035338664
-
On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer
-
[MSY01]. S. Miyazaki, K. Sakurai, and M. Yung, “On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer,” IEICE Transaction, Vol.E84-A, No.5, (2001), pp.1177-1183.
-
(2001)
IEICE Transaction, Vol.E84-A
, vol.5
, pp. 1177-1183
-
-
Miyazaki, S.1
Sakurai, K.2
Yung, M.3
-
15
-
-
84947448530
-
-
PKCS, Public-Key Cryptography Standards, RSA Laboratories
-
PKCS, Public-Key Cryptography Standards, RSA Laboratories, http://www.rsasecurity.com/rsalabs/pkcs/index.html.
-
-
-
-
16
-
-
84948954277
-
Practical Threshold Signatures
-
V. Shoup, “Practical Threshold Signatures,” Eurocrypt 2000, LNCS 1807, (2000), pp.207-220.
-
(2000)
Eurocrypt 2000, LNCS
, vol.1807
, pp. 207-220
-
-
Shoup, V.1
|