-
1
-
-
84957360970
-
Collision-free accumulators and Fail-stop signature schemes without trees
-
Springer
-
N. Barić, and B. Pfitzmann. Collision-free accumulators and Fail-stop signature schemes without trees. In Advances in Cryptology-Eurocrypt ’97, LNCS vol. 1233, Springer, 1997, pages 480-494.
-
(1997)
Advances in Cryptology-Eurocrypt ’97, LNCS
, vol.1233
, pp. 480-494
-
-
Barić, N.1
Pfitzmann, B.2
-
5
-
-
84958639277
-
Efficient Generation of Shared RSA Keys
-
Springer, Extended version
-
D. Boneh and M. Franklin. Efficient Generation of Shared RSA Keys. In Advances in Cryptology-Crypto ’97, LNCS vol. 1294, Springer, 1997, pages 425-439. Extended version available from http://crypto.stanford.edu/~dabo/pubs.html
-
(1997)
Advances in Cryptology-Crypto ’97, LNCS
, vol.1294
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
84957083549
-
Adaptive Security for Threshold Cryptosystems
-
Springer
-
R. Canetti, R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin. Adaptive Security for Threshold Cryptosystems. In Advances in Cryptology-Crypto ’99, LNCS vol. 1666, Springer, 1999, pages 98-115.
-
(1999)
Advances in Cryptology-Crypto ’99, LNCS
, vol.1666
, pp. 98-115
-
-
Canetti, R.1
Gennaro, R.2
Jarecki, S.3
Krawczyk, H.4
Rabin, T.5
-
7
-
-
84957673235
-
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications
-
Springer
-
D. Catalano and R. Gennaro. New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. In Advances in Cryptology-Crypto ’98, LNCS vol. 1462, Springer, 1998, pages 105-120.
-
(1998)
Advances in Cryptology-Crypto ’98, LNCS
, vol.1462
, pp. 105-120
-
-
Catalano, D.1
Gennaro, R.2
-
10
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
Y. Desmedt., Carl Pomerance, editor, Springer-Verlag
-
Y. Desmedt. Society and group oriented cryptography: A new concept. In Carl Pomerance, editor, Advances in Cryptology-CRYPTO’87, Lecture Notes in Computer Science Vol. 293, pp. 120-127, Springer-Verlag, 1988.
-
(1988)
Advances in Cryptology-Crypto’87, Lecture Notes in Computer Science
, vol.293
, pp. 120-127
-
-
Desmedt, Y.G.1
-
12
-
-
0031375570
-
Optimal Resilience Proactive Public-Key Cryptosystems
-
IEEE Computer Society Press
-
Y. Frankel, P. Gemmell, P. Mackenzie, and M. Yung. Optimal Resilience Proactive Public-Key Cryptosystems. 38th IEEE Symposium on the Foundations of Computer Science, pp.384-393, IEEE Computer Society Press, 1997.
-
(1997)
38Th IEEE Symposium on the Foundations of Computer Science
, pp. 384-393
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
14
-
-
0031628726
-
Robust Efficient Distributed RSA-Key Generation
-
Y. Frankel, P. Mackenzie, and M. Yung. Robust Efficient Distributed RSA-Key Generation. In STOC 1998, pp.663-672.
-
(1998)
In STOC
, pp. 663-672
-
-
Frankel, Y.1
Mackenzie, P.2
Yung, M.3
-
15
-
-
84958615646
-
Statistical Zero-Knowledge Protocols to Prove Modular Polynomial Relations
-
Springer
-
E. Fujisaki and T. Okamoto. Statistical Zero-Knowledge Protocols to Prove Modular Polynomial Relations. In Advances in Cryptology-Crypto ’97, LNCS vol. 1294, Springer, 1997, pages 16-30.
-
(1997)
Advances in Cryptology-Crypto ’97, LNCS
, vol.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
16
-
-
0011000478
-
An Introduction to Threshold Cryptography
-
Winter
-
P. Gemmell. An Introduction to Threshold Cryptography. RSA Laboratories CryptoBytes, Vol.2, No.3, Winter 1997.
-
(1997)
RSA Laboratories Cryptobytes
, vol.2
, Issue.3
-
-
Gemmell, P.1
-
17
-
-
84957661041
-
Hash-and-Sign Signatures without the Random Oracle
-
Springer
-
R. Gennaro, S. Halevi and T. Rabin. Secure Hash-and-Sign Signatures without the Random Oracle. In Advances in Cryptology-Eurocrypt ’99, LNCS vol. 1592, Springer, 1999, pages 123-139.
-
(1999)
Advances in Cryptology-Eurocrypt ’99, LNCS
, vol.1592
, pp. 123-139
-
-
Gennaro, R.1
Halevi, S.2
Secure, T.R.3
-
18
-
-
84947441722
-
Robust and Efficient sharing of RSA functions
-
Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and Efficient sharing of RSA functions. Crypto’96, pp.157-172, Lecture Notes in Computer Science vol.1109, Springer-Verlag, 1996.
-
(1996)
Crypto’96, Pp.157-172, Lecture Notes in Computer Science
, vol.1109
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
20
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Springer-Verlag
-
T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. Crypto’91, pp.129-140, Lecture Notes in Computer Science vol.576, Springer-Verlag, 1992.
-
(1992)
Crypto’91, Pp.129-140, Lecture Notes in Computer Science
, vol.576
-
-
Pedersen, T.1
-
22
-
-
0017930809
-
A Method for Obtaining Digital Signature and Public Key Cryptosystems
-
R. Rivest, A. Shamir and L. Adelman. A Method for Obtaining Digital Signature and Public Key Cryptosystems. Comm. of ACM, 21 (1978), pp. 120-126
-
(1978)
Comm. Of ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adelman, L.3
-
24
-
-
0003881012
-
Efficient Checking of Polynomials and Proofs and the Hardness of Approximation Problems
-
Springer-Verlag
-
M. Sudan. Efficient Checking of Polynomials and Proofs and the Hardness of Approximation Problems. Lecture Notes in Computer Science, vol.1001, Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.1001
-
-
Sudan, M.1
|