-
2
-
-
84958639277
-
Efficient generation of shared RSA keys
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
D. Boneh and M. Franklin. Efficient generation of shared RSA keys. In Proceedings of Advances in Cryptology: CRYPTO '97, pages 425-439. Lecture Notes in Computer Science, Springer-Verlag, New York, 1998.
-
(1998)
Proceedings of Advances in Cryptology: CRYPTO '97
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
84949995981
-
An efficient probabilistic public key encryption scheme that hides all partial information
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
M. Blum and S. Goldwasser. An efficient probabilistic public key encryption scheme that hides all partial information. In Proceedings of Advances in Cryptology: CRYPTO '84, pages 289-302. Lecture Notes in Computer Science, Springer-Verlag, New York, 1985.
-
(1985)
Proceedings of Advances in Cryptology: CRYPTO '84
, pp. 289-302
-
-
Blum, M.1
Goldwasser, S.2
-
6
-
-
0030150177
-
Comparing information without leaking it
-
May
-
R. Fagin, M. Naor, and P. Winkler. Comparing information without leaking it. Communications of the ACM, 39(5):77-85, May 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
7
-
-
0039241746
-
A practical protocol for large group oriented networks
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
Y. Frankel. A practical protocol for large group oriented networks. In Proceedings of Advances in Cryptology: EUROCRYPT '88, pages 56-61. Lecture Notes in Computer Science, Springer-Verlag, New York, 1990.
-
(1990)
Proceedings of Advances in Cryptology: EUROCRYPT '88
, pp. 56-61
-
-
Frankel, Y.1
-
9
-
-
0011000478
-
An introduction to threshold cryptography
-
(a technical newsletter of RSA Laboratories)
-
P. Gemmel. An introduction to threshold cryptography. CryptoBytes (a technical newsletter of RSA Laboratories), 2(7), 1997.
-
(1997)
CryptoBytes
, vol.2
, Issue.7
-
-
Gemmel, P.1
-
11
-
-
85028761718
-
A simple and secure way to show the validity of your public key
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
R. Peralta and J. van de Graaf. A simple and secure way to show the validity of your public key. In Proceedings of Advances in Cryptology: CRYPTO '87, pages 128-134. Lecture Notes in Computer Science, Springer-Verlag, New York, 1988.
-
(1988)
Proceedings of Advances in Cryptology: CRYPTO '87
, pp. 128-134
-
-
Peralta, R.1
van de Graaf, J.2
-
13
-
-
0001258323
-
Factoring integers with elliptic curves
-
H. W. Lenstra. Factoring integers with elliptic curves. Annals of Mathematics, 126:649-673, 1987.
-
(1987)
Annals of Mathematics
, vol.126
, pp. 649-673
-
-
Lenstra, H.W.1
-
14
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
15
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
M. Wiener. Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory, 36(3):553-558, 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.3
, pp. 553-558
-
-
Wiener, M.1
|