-
1
-
-
79958074367
-
A Forward-Secure Digital Signature Scheme
-
M. Bellare, S. Miner. A Forward-Secure Digital Signature Scheme. In Proc. Of Crypto, pp. 431-448, 1999.
-
(1999)
In Proc. Of Crypto
, pp. 431-448
-
-
Bellare, M.1
Miner, S.2
-
4
-
-
84957063575
-
On the Security Properties of the OAEP as an All-or-Nothing Transform
-
V. Boyko. On the Security Properties of the OAEP as an All-or-Nothing Transform. In Proc. of Crypto, pp. 503-518, 1999.
-
(1999)
In Proc. Of Crypto
, pp. 503-518
-
-
Boyko, V.1
-
6
-
-
0022198802
-
The Bit Extraction Problem or t-resilient Functions
-
B. Chor, J. Friedman, O. Goldreich, J. Hastad, S. Rudich, R. Smolensky. The Bit Extraction Problem or t-resilient Functions. In Proc. of FOCS, pp. 396-407, 1985.
-
(1985)
In Proc. Of FOCS
, pp. 396-407
-
-
Chor, B.1
Friedman, J.2
Goldreich, O.3
Hastad, J.4
Rudich, S.5
Smolensky, R.6
-
7
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. van Oorschot and M. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2: 107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
8
-
-
84949000502
-
New Viruses Search For Strong Encryption Keys
-
March
-
A. Dornan. New Viruses Search For Strong Encryption Keys. In PlanetIT Systems Management News, March, 1999, http://www.planetit.com/techcenters/docs/systems_management/news/PIT19990317S0015.
-
(1999)
In Planetit Systems Management News
-
-
Dornan, A.1
-
10
-
-
0025430107
-
A Note on Computational Indistinguishability
-
O. Goldreich. A Note on Computational Indistinguishability. In IPL, 34: 277-281, 1990.
-
(1990)
In IPL
, vol.34
, pp. 277-281
-
-
Goldreich, O.1
-
14
-
-
84957628646
-
Scramble All, Encrypt Small
-
M. Jakobsson, J. Stern, M. Yung. Scramble All, Encrypt Small. In Proc. of Fast Software Encryption, pp. 95-111, 1999.
-
(1999)
In Proc. Of Fast Software Encryption
, pp. 95-111
-
-
Jakobsson, M.1
Stern, J.2
Yung, M.3
-
15
-
-
0003946096
-
Secret Sharing Made Short
-
H. Krawczyk. Secret Sharing Made Short. In Proc. of Crypto, pp. 136-146, 1993.
-
(1993)
In Proc. Of Crypto
, pp. 136-146
-
-
Krawczyk, H.1
-
17
-
-
0027641832
-
Small-Bias Probability Spaces: Eçient Constructions and Applications
-
J. Naor, M. Naor. Small-Bias Probability Spaces: Eçient Constructions and Applications. In SIAM J. Computing, 22(4): 838-856, 1993.
-
(1993)
In SIAM J. Computing
, vol.22
, Issue.4
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
19
-
-
84947912552
-
All-or-Nothing Encryption and the Package Transform
-
R. Rivest. All-or-Nothing Encryption and the Package Transform. In Fast Software Encryption, LNCS, 1267: 210-218, 1997.
-
(1997)
In Fast Software Encryption, LNCS, 1267
, pp. 210-218
-
-
Rivest, R.1
-
20
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. In Communic. of the ACM, 22: 612-613, 1979.
-
(1979)
In Communic. Of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
23
-
-
84949000505
-
How not to authenticate code
-
Santa Barbara
-
N. van Someren. How not to authenticate code. Crypto’98 Rump Session, Santa Barbara, 1998.
-
(1998)
Crypto’98 Rump Session
-
-
Van Someren, N.1
-
24
-
-
0041175120
-
Computing with Very Weak Random Sources
-
A. Srinivasan, D. Zuckerman. Computing with Very Weak Random Sources. In Proc. of FOCS, pp. 264-275, 1994.
-
(1994)
In Proc. Of FOCS
, pp. 264-275
-
-
Srinivasan, A.1
Zuckerman, D.2
-
26
-
-
0032624550
-
Construction of Extractors Using PseudoRandom Generators
-
L. Trevisan. Construction of Extractors Using PseudoRandom Generators. In Proc. of STOC, pp. 141-148, 1999.
-
(1999)
In Proc. Of STOC
, pp. 141-148
-
-
Trevisan, L.1
|