-
1
-
-
85048601848
-
Cryptographic protocols provably secure against dynamic adversaries
-
Lecture Notes in Computer Science
-
D. Beaver and S. Haber. Cryptographic protocols provably secure against dynamic adversaries. In Advances in Cryptology—EUROCRYPT 92, volume 658 of Lecture Notes in Computer Science, pages 307–323. Springer-Verlag, 24–28 May 1992.
-
(1992)
Advances in Cryptology—EUROCRYPT 92
, vol.658
, pp. 307-323
-
-
Beaver, D.1
Haber, S.2
-
2
-
-
0029723583
-
-
R. Canetti, U. Feige, O. Goldreich, and M. Naor. Adaptively secure multi-party computation. In STOC’96 [33], pages 639–648.
-
Adaptively Secure Multi-Party Computation
, Issue.33
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
3
-
-
17244362322
-
-
R. Canetti, R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Adaptive security of threshold systems. to appear in Crypto’99, 1999.
-
(1999)
Adaptive Security of Threshold Systems
-
-
Canetti, R.1
Gennaro, R.2
Jarecki, S.3
Krawczyk, H.4
Rabin, T.5
-
6
-
-
38149065479
-
-
Advances in Cryptology—CRYPTO’89
-
Advances in Cryptology—CRYPTO’89, volume 435 of Lecture Notes in Computer Science. Springer-Verlag, 1990, 20–24 Aug. 1989.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 20-24
-
-
-
7
-
-
84956862838
-
-
Advances in Cryptology—CRYPTO’91
-
Advances in Cryptology—CRYPTO’91, volume 576 of Lecture Notes in Computer Science. Springer-Verlag, 1992, 11–15 Aug. 1991.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 11-15
-
-
-
8
-
-
0027961556
-
How to share a function securely (Extended summary)
-
A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung. How to share a function securely (extended summary). In Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, pages 522–533, Montréal, Québec, Canada, 23–25 May 1994.
-
(1994)
Proceedingsof the Twenty-Sixth Annual ACM Symposium on the Theory of Computing
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
9
-
-
84985822377
-
-
Threshold cryptosystems. In J. Seberry and Y. Zheng, editors, Springer-Verlag
-
Y. Desmedt. Threshold cryptosystems. In J. Seberry and Y. Zheng, editors, Advances in Cryptology—AUSCRYPT’92, volume 718 of Lecture Notes in Computer Science, pages 3–14, Gold Coast, Queensland, Australia, 13–16 Dec. 1992. Springer-Verlag.
-
(1992)
Advances in Cryptology—AUSCRYPT’92
, vol.718
, pp. 3-14
-
-
Desmedt, Y.1
-
14
-
-
0023538330
-
-
A practical scheme for non-interactive verifiable secret sharing
-
P. Feldman. A practical scheme for non-interactive verifiable secret sharing. In 28th Annual Symposium on Foundations of Computer Science, pages 427–437, Los Angeles, California, 12–14 Oct. 1987. IEEE. 182
-
(1987)
In 28Th Annual Symposium on Foundations
, pp. 427-437
-
-
Feldman, P.1
-
15
-
-
0031375570
-
-
Y. Frankel, P. Gemmell, P. D. MacKenzie, and M. Yung. Optimal-resilience proactive public-key cryptosystems. In 38th Annual Symposium on Foundations of Computer Science, pages 384–393, Miami Beach, Florida, 20–22 Oct. 1997. IEEE. 181, 182
-
(1997)
In 38Th Annual Symposium on Foundations of Computer Science
, pp. 384-393
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.D.3
Yung, M.4
-
16
-
-
84958676203
-
-
In Advances in Cryptology—CRYPTO’97
-
Y. Frankel, P. Gemmell, P. D. MacKenzie, and M. Yung. Proactive RSA. In Advances in Cryptology—CRYPTO’97, volume 1294 of Lecture Notes in Computer Science, pages 440–454. Springer-Verlag, 17–21 Aug. 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 440-454
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.D.3
Yung, M.4
-
19
-
-
84958045007
-
-
Adaptively-secure distributed public-key systems
-
Y. Frankel, P. D. MacKenzie, and M. Yung. Adaptively-secure distributed public-key systems. In European Symposium on Algorithms—ESA’99, volume 1643 of Lecture Notes in Computer Science, pages 4–27. Springer-Verlag, 16–18 July 1998.
-
(1998)
In European Symposium on Algorithms—ESA’99
, vol.1643
, pp. 4-27
-
-
Frankel, Y.1
Mackenzie, P.D.2
Yung, M.3
-
21
-
-
22044454382
-
-
Distributed public-key cryptosystems Advances in Public Key Cryptography—PKC’98
-
Y. Frankel and M. Yung. Distributed public-key cryptosystems. In H. Imai and Y. Zheng, editors, Advances in Public Key Cryptography—PKC’98, volume 1431 of Lecture Notes in Computer Science, pages 1–13. Springer-Verlag, Feb. 1998. invited talk.
-
(1998)
Lecture Notes in Computer Science
, vol.1431
, pp. 1-13
-
-
Frankel, Y.1
Yung, M.2
Imai, H.3
Zheng, Y.4
-
22
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of RSA functions. In Advances in Cryptology—CRYPTO’96, volume 1109 of Lecture Notes in Computer Science, pages 157–172. Springer-Verlag, 18–22 Aug. 1996.
-
(1996)
In Advances in Cryptology—CRYPTO’96
, vol.1109
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
24
-
-
0030646698
-
Proactive public-key and signature schemes
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung. Proactive public-key and signature schemes. In Proceedings of the Third Annual Conference on Computer and Communications Security, pages 100–110, 1996.
-
(1996)
Proceedings of the Third Annual Conference on Computer and Communications Security
, pp. 100-110
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
25
-
-
84957626176
-
-
Proactive secret sharing, or: How to cope with perpetual leakage, Springer-Verlag
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing, or: How to cope with perpetual leakage. In Advances in Cryptology—CRYPTO’95, volume 963 of Lecture Notes in Computer Science, pages 339–352. Springer-Verlag, 27–31 Aug. 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
27
-
-
84871584138
-
Advances in Cryptology—CRYPTO’98
-
Springer-Verlag
-
H. Krawczyk, editor. Advances in Cryptology—CRYPTO’98, volume 1462 of Lecture Notes in Computer Science. Springer-Verlag, 17–21 Aug. 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 17-21
-
-
Krawczyk, H.1
-
32
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 22:612–613, 1979.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|