-
1
-
-
0006480739
-
Auctions on the internet: A field study. Working Paper 98-WP-103
-
Haas School of Business, University of California, Berkeley
-
C. Beam and A. Segev. Auctions on the internet: A field study. Working Paper 98-WP-103, Fisher Center for Management and Information Technology, Haas School of Business, University of California, Berkeley, 1998.
-
(1998)
Fisher Center for Management and Information Technology
-
-
Beam, C.1
Segev, A.2
-
2
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computing
-
M. Ben-Or, S. Goldwasser, and A. Widgerson. Completeness theorems for noncryptographic fault-tolerant distributed computing. In Proceedings of the 20th STOC, ACM, pages 1-10, 1988.
-
(1988)
Proceedings of the 20Th STOC, ACM
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Widgerson, A.3
-
3
-
-
84949265460
-
Efficient Private Bidding and Auctions with an Oblivious Third Party
-
C. Cachin. Efficient Private Bidding and Auctions with an Oblivious Third Party. IBM research Report RZ 3131, 1999.
-
(1999)
IBM Research Report RZ 3131
-
-
Cachin, C.1
-
4
-
-
84957610863
-
Proving that a Number Is the Product of Two Safe Primes
-
Springer-Verlag
-
J. Camenisch and M. Michels. Proving that a Number Is the Product of Two Safe Primes. In Eurocrypt’99, LNCS 1592, pages 107-122. Springer-Verlag, 1999.
-
(1999)
Eurocrypt’99, LNCS 1592
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
5
-
-
0002882557
-
Efficient group signature schemes for large groups
-
Springer-Verlag
-
J. Camenish and M. Stadler. Efficient group signature schemes for large groups. In Crypto’97, LNCS 1294, pages 17-21. Springer-Verlag, 1997.
-
(1997)
Crypto’97, LNCS 1294
, pp. 17-21
-
-
Camenish, J.1
Stadler, M.2
-
6
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crepeau, and I. Damgaard. Multiparty unconditionally secure protocols. In Proceedings of the 20th STOC, ACM, pages 11-19, 1988.
-
(1988)
Proceedings of the 20Th STOC, ACM
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgaard, I.3
-
7
-
-
0001853827
-
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
-
CSR9413
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. Technical report, CWI, 1994. CSR9413.
-
(1994)
Technical Report, CWI
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
8
-
-
84958950087
-
On Monotone Formula Closure of SZK
-
IEEE
-
A. de Santis, L. di Crescenzo, G. Persiano, and M. Yung. On Monotone Formula Closure of SZK. In Proc. of the 35th FOCS, pages 454-465. IEEE, 1994.
-
(1994)
Proc. Of the 35Th FOCS
, pp. 454-465
-
-
De Santis, A.1
Di Crescenzo, L.2
Persiano, G.3
Yung, M.4
-
9
-
-
33750826658
-
Secure Fault-tolerant Protocols and the Public-Key Model
-
Springer-Verlag
-
Z. Galil, S. Haber, and M. Yung. Secure Fault-tolerant Protocols and the Public-Key Model. In Crypto’87. Springer-Verlag, 1987.
-
(1987)
Crypto’87
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
10
-
-
0023545076
-
How to play any mental game
-
O. Goldreich, S. Micali, and A. Widgerson. How to play any mental game. In Proceedings of the 19th STOC, ACM, pages 218-229, 1987.
-
(1987)
Proceedings of the 19Th STOC, ACM
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Widgerson, A.3
-
11
-
-
0141653334
-
How to Solve any Protocol Problem-An efficiency Improvement
-
Springer-Verlag
-
O. Goldreich and R. Vainish. How to Solve any Protocol Problem-An efficiency Improvement. In Crypto’87. Springer-Verlag, 1987.
-
(1987)
Crypto’87
-
-
Goldreich, O.1
Vainish, R.2
-
13
-
-
84959165880
-
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory
-
Springer-Verlag
-
L. C. Guillou and J.-J. Quisquater. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. In Eurocrypt’88, LNCS 330, pages 123-128. Springer-Verlag, 1988.
-
(1988)
Eurocrypt’88, LNCS 330
, pp. 123-128
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
16
-
-
84957366256
-
A New Public-Key Cryptosystem
-
Springer-Verlag
-
D. Naccache and J. Stern. A New Public-Key Cryptosystem. In Eurocrypt’97, LNCS 1233, pages 27-36. Springer-Verlag, 1997.
-
(1997)
Eurocrypt’97, LNCS 1233
, pp. 27-36
-
-
Naccache, D.1
Stern, J.2
-
17
-
-
84956852274
-
A New Public Key Cryptosystem as Secure as Factoring
-
Springer-Verlag
-
T. Okamoto and S. Uchiyama. A New Public Key Cryptosystem as Secure as Factoring. In Eurocrypt’98, LNCS 1403, pages 308-318. Springer-Verlag, 1998.
-
(1998)
Eurocrypt’98, LNCS 1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
18
-
-
0000277371
-
Public-Key Cryptosystems Based on Discrete Logarithms Residues
-
Springer-Verlag
-
P. Paillier. Public-Key Cryptosystems Based on Discrete Logarithms Residues. In Eurocrypt’99, LNCS. Springer-Verlag, 1999.
-
(1999)
Eurocrypt’99, LNCS
-
-
Paillier, P.1
-
20
-
-
84957640282
-
Security Analysis of a Practical “on the fly” Authentication and Signature Generation
-
Springer-Verlag
-
G. Poupard and J. Stern. Security Analysis of a Practical “on the fly” Authentication and Signature Generation. In Eurocrypt’98, LNCS 1403, pages 422-436. Springer-Verlag, 1998.
-
(1998)
Eurocrypt’98, LNCS 1403
, pp. 422-436
-
-
Poupard, G.1
Stern, J.2
-
22
-
-
0018545449
-
How to Share a Secret
-
November
-
A. Shamir. How to Share a Secret. Communications of the ACM, 22:612-613, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
23
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE
-
A. Yao. How to generate and exchange secrets. In Proc. of the 27th FOCS, pages 162-167. IEEE, 1986.
-
(1986)
Proc. Of the 27Th FOCS
, pp. 162-167
-
-
Yao, A.1
|