-
1
-
-
0003030602
-
Coin Flipping by Telephone: A Protocol for Solving Impossible Problems
-
Blum, M. Coin Flipping by Telephone: A Protocol for Solving Impossible Problems, Proceedings of the 24th IEEE Computer Conference, pages 133–137, 1981.
-
(1981)
Proceedings of the 24th IEEE Computer Conference
, pp. 133-137
-
-
Blum, M.1
-
2
-
-
0348118050
-
Practical zero-knowledge proofs: Giving hints and using deficiencies
-
(J.-J. Quisquater and J. Vandewalle, eds.), Lecture Notes in Computer Science 434, Springer-Verlag
-
Boyar, J., Friedl, K. and Lund, C. Practical zero-knowledge proofs: Giving hints and using deficiencies, Advances in Cryptology — Proceedings of EUROCRYPT 89 (J.-J. Quisquater and J. Vandewalle, eds.), Lecture Notes in Computer Science 434, Springer-Verlag 1990, pages 155–172.
-
(1990)
Advances in Cryptology — Proceedings of EUROCRYPT
, vol.89
, pp. 155-172
-
-
Boyar, J.1
Friedl, K.2
Lund, C.3
-
3
-
-
84974588386
-
-
Lecture Notes in Computer Science 1880, Springer-Verlag
-
Boneh, D. and Naor, M. Timed commitments (extended abstract), Advances in Cryptology: Proceedings of CRYPTO’00, Lecture Notes in Computer Science 1880, Springer-Verlag 2000, pages 236–254.
-
(2000)
Timed Commitments (Extended Abstract), Advances in Cryptology: Proceedings of CRYPTO’00
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
4
-
-
0011390710
-
Proving in zero-knowledge that a number is the product of two safe primes
-
(J. Stern ed.), Lecture Notes in Computer Science 1592, Springer-Verlag
-
Camenisch J. and Michels, M. Proving in zero-knowledge that a number is the product of two safe primes, In Advances in Cryptology — EUROCRYPT 99 (J. Stern ed.), Lecture Notes in Computer Science 1592, Springer-Verlag 1999, pages 106–121.
-
(1999)
Advances in Cryptology — EUROCRYPT 99
, pp. 106-121
-
-
Camenisch, J.1
Michels, M.2
-
5
-
-
85043778396
-
-
(I.B. Damgaard, ed.) Lecture Notes in Computer Science 473, Springer-Verlag
-
Chaum, D. Zero-knowledge undeniable signatures, Advances in Cryptology: Proceedings of CRYPTO 90 (I.B. Damgaard, ed.) Lecture Notes in Computer Science 473, Springer-Verlag 1991, pages 458-464.
-
(1991)
Zero-Knowledge Undeniable Signatures, Advances in Cryptology: Proceedings of CRYPTO 90
, pp. 458-464
-
-
Chaum, D.1
-
6
-
-
84949192343
-
-
(T. Helleseth ed.), Lecture Notes in Computer Science 765, Springer-Verlag
-
Damgård, I. Practical and probably secure release of a secret and exchange of signatures, Advances in Cryptology—Proceedings of EUROCRYPT 93 (T. Helleseth ed.), Lecture Notes in Computer Science 765, Springer-Verlag 1994, pages 200–217.
-
(1994)
Practical and Probably Secure Release of a Secret and Exchange of Signatures, Advances in Cryptology—Proceedings of EUROCRYPT 93
, pp. 200-217
-
-
Damgård, I.1
-
7
-
-
84880853825
-
RSA-OAEP is Secure under the RSA Assumption
-
Springer-Verlag
-
Fujisaki, E., Okamoto, T., Pointcheval, D. and Stern, J. RSA-OAEP is Secure under the RSA Assumption, To appear in Advances in Cryptology: Proceedings of CRYPTO 01, Springer-Verlag 2001.
-
(2001)
Advances in Cryptology: Proceedings of CRYPTO 01
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
8
-
-
84949284619
-
RSA-based undeniable signatures for general moduli
-
February
-
Galbraith, S., Mao, W. and Paterson, K. RSA-based undeniable signatures for general moduli, to appear in the 2002 RSA Conference, Cryptographers’ Track, February 2002.
-
(2002)
The 2002 RSA Conference, Cryptographers’ Track
-
-
Galbraith, S.1
Mao, W.2
Paterson, K.3
-
9
-
-
85032868051
-
How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design
-
(A.M. Odlyzko ed.), Lecture Notes in Computer Science, Springer-Verlag
-
Goldreich, O., Micali, S. and Wigderson, A. How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design, Advances in Cryptology — Proceedings of CRYPTO 86 (A.M. Odlyzko ed.), Lecture Notes in Computer Science, Springer-Verlag 263 (1987), pages 171–185.
-
(1987)
Advances in Cryptology — Proceedings of CRYPTO 86
, vol.263
, pp. 171-185
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
10
-
-
84949284620
-
-
Description of the LCS35 Time Capsule Crypto-Puzzle, April 4th
-
Rivest, R.L. Description of the LCS35 Time Capsule Crypto-Puzzle, http://www.lcs.mit.edu/about/tcapintro041299, April 4th, 1999.
-
(1999)
-
-
Rivest, R.L.1
-
12
-
-
85028761718
-
A simple and secure way to show that validity of your public key
-
(C. Pomerance ed.), Springer LNCS
-
van de Graaf, J. and Peralta, R. A simple and secure way to show that validity of your public key, (C. Pomerance ed.), CRYPTO’87, Springer LNCS 293, (1988) 128–134.
-
(1988)
CRYPTO’87
, vol.293
, pp. 128-134
-
-
van de Graaf, J.1
Peralta, R.2
-
13
-
-
17444376558
-
Parallel collision search with cryptanalytic applications
-
van Oorschot, P.C. and Wiener, M.J. Parallel collision search with cryptanalytic applications, J. of Cryptology, Vol.12, No.1 (1999), pages 1–28.
-
(1999)
J. Of Cryptology
, vol.12
, Issue.1
, pp. 1-28
-
-
van Oorschot, P.C.1
Wiener, M.J.2
|