-
4
-
-
84951871753
-
NIST Special Publication 800-57 - Recommendation for Key Management - Part 1: General (Revision 3)
-
Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: NIST Special Publication 800-57 - Recommendation for Key Management - Part 1: General (Revision 3). National Institute of Standards and Technology (2012). http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf
-
(2012)
National Institute of Standards and Technology
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
5
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
ACM, New York
-
Ben-Or, M., Goldwasser, S., Widgerson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: STOC 1988: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp. 1-10. ACM, New York (1988). ISBN 0-89791-264-0, http://dx.doi.org/10.1145/62212.62213
-
(1988)
STOC 1988: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Widgerson, A.3
-
7
-
-
85024928440
-
Proving security against chosen cyphertext attacks
-
In: Goldwasser, S. (ed.), Springer, Heidelberg
-
Blum, M., Feldman, P., Micali, S.: Proving security against chosen cyphertext attacks. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 256-268. Springer, Heidelberg (1990)
-
(1990)
CRYPTO 1988. LNCS
, vol.403
, pp. 256-268
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
9
-
-
84929273746
-
Untraceable electronic cash
-
In: Goldwasser, S. (ed.), Springer, Heidelberg
-
Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319-327. Springer, Heidelberg (1990). http://dx.doi.org/10.1007/0-387-34799-2_25
-
(1990)
CRYPTO 1988. LNCS
, vol.403
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
10
-
-
84958774556
-
A statistically-hiding integer commitment scheme based on groups with hidden order
-
In: Zheng, Y. (ed.), Springer, Heidelberg
-
Damgard, I.B., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: Zheng, Y. (ed.) ASI- ACRYPT 2002. LNCS, vol. 2501, pp. 125-142. Springer, Heidelberg (2002). http://dx.doi.org/10.1007/3-540-36178-2_8
-
(2002)
ASI- ACRYPT 2002. LNCS
, vol.2501
, pp. 125-142
-
-
Damgard, I.B.1
Fujisaki, E.2
-
11
-
-
84958615646
-
Statistical zero knowledge protocols to prove modular polynomial relations
-
In: Kaliski Jr, B.S. (ed.), Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Statistical zero knowledge protocols to prove modular polynomial relations. In: Kaliski Jr, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 16-30. Springer, Heidelberg (1997). http://dx.doi.org/10.1007/BFb0052225
-
(1997)
CRYPTO 1997
, vol.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
12
-
-
84890514001
-
Generating safe primes
-
1862-2984 (Online) 1862-2976 Print
-
von zur Gathen, J., Shparlinski, I.: Generating safe primes. J. Math. Cryptol. 7(4), 333-365 (2013). ISSN 1862-2984 (Online) 1862-2976 (Print), http://dx.doi.org/10.1515/jmc-2013-5011
-
(2013)
J. Math. Cryptol
, vol.7
, Issue.4
, pp. 333-365
-
-
Von Zur Gathen, J.1
Shparlinski, I.2
-
13
-
-
84947926543
-
Robust threshold DSS signatures
-
In: Maurer, U.M. (ed.), Springer, Heidelberg
-
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust threshold DSS signatures. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 354-371. Springer, Heidelberg (1996). http://dx.doi.org/10.1007/3-540-68339-9_31
-
(1996)
EUROCRYPT 1996. LNCS
, vol.1070
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
14
-
-
84951870915
-
-
Preprint
-
Goldfeder, S., Bonneau, J., Felten, E.W., Kroll, J.A., Narayanan, A.: Securing Bitcoin wallets via threshold signatures (2014). http://www.cs.princeton.edu/~stevenag/bitcoin_threshold_signatures.pdf. Preprint
-
(2014)
Securing Bitcoin Wallets via Threshold Signatures
-
-
Goldfeder, S.1
Bonneau, J.2
Felten, E.W.3
Kroll, J.A.4
Narayanan, A.5
-
15
-
-
84943160306
-
-
Preprint
-
Goldfeder, S., Gennaro, R., Kalodner, H., Bonneau, J., Kroll, J.A., Felten, E.W., Narayanan, A.: Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme (2015). http://www.cs.princeton.edu/~stevenag/threshold_sigs.pdf. Preprint
-
(2015)
Securing Bitcoin Wallets via a New DSA/ECDSA Threshold Signature Scheme
-
-
Goldfeder, S.1
Gennaro, R.2
Kalodner, H.3
Bonneau, J.4
Kroll, J.A.5
Felten, E.W.6
Narayanan, A.7
-
17
-
-
84951875405
-
-
Bitcoin Mailing list
-
Hearn, M.: Update on mobile 2-factor wallets (2014). Bitcoin Mailing list at http://sourceforge.net, http://sourceforge.net/p/bitcoin/mailman/message/33017648/
-
(2014)
Update on Mobile 2-Factor Wallets
-
-
Hearn, M.1
-
18
-
-
85150432710
-
A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme
-
Ibrahim, M.H., Ali, I.A., Ibrahim, I.I., El-sawi, A.H.: A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme. In: MWCAS03, vol. 1, pp. 276-280.
-
MWCAS03
, vol.1
, pp. 276-280
-
-
Ibrahim, M.H.1
Ali, I.A.2
Ibrahim, I.I.3
El-Sawi, A.H.4
-
19
-
-
84951875406
-
-
0-7803-8294-3, 1548-3746
-
IEEE Computer Society, Cairo (2003). ISBN 0-7803-8294-3, ISSN 1548-3746, http://dx.doi.org/10.1109/MWSCAS.2003.1562272
-
(2003)
-
-
-
20
-
-
0001464763
-
Multiplication of multidigit numbers on automata
-
Translated from Doklady Akademii Nauk SSSR145, No. 2293-294, July 1962
-
Karatsuba, A., Ofman, Y.: Multiplication of multidigit numbers on automata. Sov. Phys. Doklady 7(7), 595-596 (1963). Translated from Doklady Akademii Nauk SSSR, vol. 145, No. 2, pp. 293-294, July 1962
-
(1963)
Sov. Phys. Doklady
, vol.7
, Issue.7
, pp. 595-596
-
-
Karatsuba, A.1
Ofman, Y.2
-
21
-
-
84889020006
-
Predictability of android openSSL’s pseudo random number generator
-
ACM, New York , 978-1-4503-2477-9
-
Kim, S.H., Han, D., Lee, D.H.: Predictability of android openSSL’s pseudo random number generator. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 659-668. ACM, New York (2013). ISBN: 978-1-4503-2477-9, http://dx.doi.org/10.1145/2508859.2516706
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 659-668
-
-
Kim, S.H.1
Han, D.2
Lee, D.H.3
-
23
-
-
84957620003
-
-
Coppersmith, (ed.), Springer, Heidelberg
-
Langford, S.K.: Threshold DSS signatures without a trusted party. In: Coppersmith, (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 397-409. Springer, Heidelberg (1995). http://dx.doi.org/10.1007/3-540-44750-4_32
-
(1995)
Threshold DSS signatures without a trusted party
, vol.963
, pp. 397-409
-
-
Langford, S.K.1
-
25
-
-
33645398871
-
Two-party generation of DSA signatures
-
MacKenzie, P., Reiter, M.K.: Two-party generation of DSA signatures. Int. J. Inf. Secur. 2(3-4), 218-239 (2004). http://dx.doi.org/10.1007/s10207-004-0041-0
-
(2004)
Int. J. Inf. Secur
, vol.2
, Issue.3-4
, pp. 218-239
-
-
Mackenzie, P.1
Reiter, M.K.2
-
26
-
-
84951875408
-
A prototypic implementation of a two-factor Bitcoin wallet: Source code
-
Christopher Mann (2014). A prototypic implementation of a two-factor Bitcoin wallet: Source code. GitHub. https://github.com/ChristopherMann/2FactorWallet
-
(2014)
Github
-
-
Mann, C.1
-
27
-
-
84951875409
-
-
Master thesis, Mathematisch-Naturwissenschaftliche Fakultat der Rheinischen Friedrich-Wilhelms- Universitat Bonn
-
Mann, C.: Two-factor authentication for the Bitcoin protocol. Master thesis, Mathematisch-Naturwissenschaftliche Fakultat der Rheinischen Friedrich-Wilhelms- Universitat Bonn (2015). https://github.com/ChristopherMann/2FactorWallet/raw/master/BitcoinTwoFactorAuth.pdf
-
(2015)
Two-Factor Authentication for the Bitcoin Protocol
-
-
Mann, C.1
-
28
-
-
79251545889
-
-
Cryptography Mailing list, NIST: Federal Information Processing Standards Publication 180-4 - Secure Hash Standard
-
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at metzdowd.com, 9 pages (2008). https://bitcoin.org/bitcoin.pdf NIST: Federal Information Processing Standards Publication 180-4 - Secure Hash Standard.
-
(2008)
Bitcoin: A Peer-To-Peer Electronic Cash System
, pp. 9
-
-
Nakamoto, S.1
-
29
-
-
84951875410
-
-
National Institute of Standards and Technology (2012). http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf
-
(2012)
-
-
-
31
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
In: Stern, J. (ed.), Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999). http://dx.doi.org/10.1007/3-540-48910-X16
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
32
-
-
84951875411
-
Finding holes operation emmental
-
Sancho, D., Hacquebord, F., Link, R.: Finding holes operation emmental. Technical report, Trend Micro Incorporated (2014). http://housecall. trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-finding-holes-operation-emmental.pdf
-
(2014)
Technical Report, Trend Micro Incorporated
-
-
Sancho, D.1
Hacquebord, F.2
Link, R.3
-
33
-
-
34250459760
-
Schnelle Multiplikation grofier Zahlen
-
Schonhage, A., Strassen, V.: Schnelle Multiplikation grofier Zahlen. Computing 7, 281-292 (1971)
-
(1971)
Computing
, vol.7
, pp. 281-292
-
-
Schonhage, A.1
Strassen, V.2
-
35
-
-
0031362009
-
(t+1, n) threshold and generalized DSS signatures without a trusted party
-
0-8-86-8274-4
-
Wang, C.-H., Hwang, T.: (t+1, n) threshold and generalized DSS signatures without a trusted party. In: Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), pp. 221-226. IEEE (1997). ISBN: 0-8186-8274-4, http://dx.doi.org/10.1109/CSAC.1997.646193
-
(1997)
In: Proceedings of the 13th Annual Computer Security Applications Conference
, pp. 221-226
-
-
Wang, C.-H.1
Hwang, T.2
-
36
-
-
54049105893
-
Safe prime generation with a combined sieve
-
Wiener, M.J.: Safe prime generation with a combined sieve. Cryptology ePrint Archive 2003/186 (2003). http://eprint.iacr.org/2003/186
-
(2003)
Cryptology Eprint Archive 2003/186
-
-
Wiener, M.J.1
-
37
-
-
84951872398
-
Dealing with malleability
-
Wuille, P.: Dealing with malleability. Technical report, Bitcoin Project (2014). https://github.com/bitcoin/bips/blob/master/bip-0062.mediawiki
-
(2014)
Technical Report, Bitcoin Project
-
-
Wuille, P.1
|