메뉴 건너뛰기




Volumn 2259, Issue , 2001, Pages 342-357

Timed-release cryptography

Author keywords

Efficient zero knowledge protocols; Non parallelisability; Time lock puzzles; Timed release cryptography

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84949193057     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45537-x_27     Document Type: Conference Paper
Times cited : (36)

References (13)
  • 1
    • 0003030602 scopus 로고
    • Coin Flipping by Telephone: A Protocol for Solving Impossible Problems
    • Blum, M. Coin Flipping by Telephone: A Protocol for Solving Impossible Problems, Proceedings of the 24th IEEE Computer Conference, pages 133–137, 1981.
    • (1981) Proceedings of the 24th IEEE Computer Conference , pp. 133-137
    • Blum, M.1
  • 2
    • 0348118050 scopus 로고
    • Practical zero-knowledge proofs: Giving hints and using deficiencies
    • (J.-J. Quisquater and J. Vandewalle, eds.), Lecture Notes in Computer Science 434, Springer-Verlag
    • Boyar, J., Friedl, K. and Lund, C. Practical zero-knowledge proofs: Giving hints and using deficiencies, Advances in Cryptology — Proceedings of EUROCRYPT 89 (J.-J. Quisquater and J. Vandewalle, eds.), Lecture Notes in Computer Science 434, Springer-Verlag 1990, pages 155–172.
    • (1990) Advances in Cryptology — Proceedings of EUROCRYPT , vol.89 , pp. 155-172
    • Boyar, J.1    Friedl, K.2    Lund, C.3
  • 4
    • 0011390710 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number is the product of two safe primes
    • (J. Stern ed.), Lecture Notes in Computer Science 1592, Springer-Verlag
    • Camenisch J. and Michels, M. Proving in zero-knowledge that a number is the product of two safe primes, In Advances in Cryptology — EUROCRYPT 99 (J. Stern ed.), Lecture Notes in Computer Science 1592, Springer-Verlag 1999, pages 106–121.
    • (1999) Advances in Cryptology — EUROCRYPT 99 , pp. 106-121
    • Camenisch, J.1    Michels, M.2
  • 9
    • 85032868051 scopus 로고
    • How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design
    • (A.M. Odlyzko ed.), Lecture Notes in Computer Science, Springer-Verlag
    • Goldreich, O., Micali, S. and Wigderson, A. How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design, Advances in Cryptology — Proceedings of CRYPTO 86 (A.M. Odlyzko ed.), Lecture Notes in Computer Science, Springer-Verlag 263 (1987), pages 171–185.
    • (1987) Advances in Cryptology — Proceedings of CRYPTO 86 , vol.263 , pp. 171-185
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 10
    • 84949284620 scopus 로고    scopus 로고
    • Description of the LCS35 Time Capsule Crypto-Puzzle, April 4th
    • Rivest, R.L. Description of the LCS35 Time Capsule Crypto-Puzzle, http://www.lcs.mit.edu/about/tcapintro041299, April 4th, 1999.
    • (1999)
    • Rivest, R.L.1
  • 12
    • 85028761718 scopus 로고
    • A simple and secure way to show that validity of your public key
    • (C. Pomerance ed.), Springer LNCS
    • van de Graaf, J. and Peralta, R. A simple and secure way to show that validity of your public key, (C. Pomerance ed.), CRYPTO’87, Springer LNCS 293, (1988) 128–134.
    • (1988) CRYPTO’87 , vol.293 , pp. 128-134
    • van de Graaf, J.1    Peralta, R.2
  • 13
    • 17444376558 scopus 로고    scopus 로고
    • Parallel collision search with cryptanalytic applications
    • van Oorschot, P.C. and Wiener, M.J. Parallel collision search with cryptanalytic applications, J. of Cryptology, Vol.12, No.1 (1999), pages 1–28.
    • (1999) J. Of Cryptology , vol.12 , Issue.1 , pp. 1-28
    • van Oorschot, P.C.1    Wiener, M.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.