-
2
-
-
85062838317
-
Safeguarding cryptographic keys
-
volume 48 ofAmerican Federation of Information Processing Societies Proceedings
-
B. Blakley. Safeguarding cryptographic keys. InProceedings of the National Computer Conference 1979, volume 48 ofAmerican Federation of Information Processing Societies Proceedings, pages 313-317, 1979.
-
(1979)
Proceedings of the National Computer Conference 1979
, pp. 313-317
-
-
Blakley, B.1
-
4
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
Oct
-
G. Brassard, D. Chaum, and C. Crépeau. Minimum disclosure proofs of knowledge.Journal of Computer and System, Sciences, 37(2):156-189, Oct. 1988.
-
(1988)
Journal of Computer and System, Sciences
, vol.37
, Issue.2
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crépeau, C.3
-
7
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. InProceedings of the 26th IEEE Symposium on the Foundations of Computer Science (FOCS), pages 383-395, 1985.
-
(1985)
Proceedings of the 26th IEEE Symposium on the Foundations of Computer Science (FOCS)
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
9
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms.IEEE Transactions on Information Theory, IT-31(4):469 472, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
12
-
-
84990731886
-
How to prove yourself: Practical solution to identification and signature problems
-
volume 263 ofLecture Notes in Computer Science. Springer-Verlag,
-
A. Fiat and A. Shamir. How to prove yourself: Practical solution to identification and signature problems. InAdvances in Cryptology-CRYPTO'86, volume 263 ofLecture Notes in Computer Science, pages 186-194. Springer-Verlag, 1987.
-
(1987)
Advances in Cryptology-CRYPTO'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
14
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
volume 330 ofLecture Notes in Computer Science. Springer-Verlag,
-
L. Guillou and J.-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. InAdvances in Cryptology - EUROCRYPT'88, volume 330 ofLecture Notes in Computer Science, pages 123-128. Springer-Verlag, 1988.
-
(1988)
Advances in Cryptology - EUROCRYPT'88
, pp. 123-128
-
-
Guillou, L.1
Quisquater, J.-J.2
-
16
-
-
0041591168
-
-
Technical Report TR-579.b, MIT, November
-
S. Micali. Fair cryptosystems. Technical Report TR-579.b, MIT, November 1993.
-
(1993)
Fair cryptosystems
-
-
Micali, S.1
-
18
-
-
84876222959
-
Distributed provers with applications to undeniable signatures
-
volume 547 ofLecture Notes in Computer Science. Springer-Verlag,
-
T. Pedersen. Distributed provers with applications to undeniable signatures. InAdvances in Cryptology - EUROCRYPT'91, volume 547 ofLecture Notes in Computer Science, pages 221-242. Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology - EUROCRYPT'91
, pp. 221-242
-
-
Pedersen, T.1
-
19
-
-
0000537828
-
Efficient identification and signature for smart cards
-
volume 435 ofLecture Notes in Computer Science. Springer-Verlag,
-
C. Schnorr. Efficient identification and signature for smart cards. InAdvances in Cryptology-CRYPTO'89, volume 435 ofLecture Notes in Computer Science, pages 239-252. Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology-CRYPTO'89
, pp. 239-252
-
-
Schnorr, C.1
-
20
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret.Communications of the ACM, 22(11):612 613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
21
-
-
84957629646
-
Fair blind signatures
-
volume 921 ofLecture Notes in Computer Science. Springer-Verlag,
-
M. Stadler, J.-M. Piveteau, and J. Camenisch. Fair blind signatures. InAdvances in Cryptology-EUROCRYPT'95, volume 921 ofLecture Notes in Computer Science, pages 209-219. Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology-EUROCRYPT'95
, pp. 209-219
-
-
Stadler, M.1
Piveteau, J.-M.2
Camenisch, J.3
|