-
2
-
-
84957718934
-
Divertible Protocols and Atomic Proxy Cryptography
-
M. Blaze, G. Bleumer, M. Strauss, “Divertible Protocols and Atomic Proxy Cryptography,” Eurocrypt ’98, pp. 127-144.
-
Eurocrypt ’98
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
4
-
-
85043778396
-
Zero-Knowledge Undeniable Signatures
-
D. Chaum, “Zero-Knowledge Undeniable Signatures,” Eurocrypt ’90, pp. 458-464.
-
Eurocrypt ’90
, pp. 458-464
-
-
Chaum, D.1
-
5
-
-
0027961556
-
How to Share a Function Securely
-
A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung, “How to Share a Function Securely,” STOC ’94, pp. 522-533.
-
STOC ’94
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
6
-
-
85032883059
-
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
T. ElGamal. “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Crypto ’84, pp. 10-18.
-
Crypto ’84
, pp. 10-18
-
-
Elgamal, T.1
-
7
-
-
84958676203
-
Proactive RSA
-
Y. Frankel, P. Gemmell, P. MacKenzie, M. Yung, “Proactive RSA,” Proc. of CRYPTO ’97, pp. 440-454.
-
Proc. of CRYPTO ’97
, pp. 440-454
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
9
-
-
84957626176
-
Proactive Secret Sharing, or How to Cope with Perpetual Leakage
-
A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, “Proactive Secret Sharing, or How to Cope with Perpetual Leakage,” Crypto ’95, pp. 339-352.
-
Crypto ’95
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
10
-
-
0030646698
-
Proactive Public Key and Signature Systems
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, M. Yung, ‘‘Proactive Public Key and Signature Systems,” Proceedings of the 4th ACM Conference on Computer and Communications Security, 1997, pp. 100-110.
-
(1997)
Proceedings of the 4Th ACM Conference on Computer and Communications Security
, pp. 100-110
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
12
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
T. P. Pedersen. “Non-interactive and information-theoretic secure verifiable secret sharing,” Crypto ’91, pp. 129-140.
-
Crypto ’91
, pp. 129-140
-
-
Pedersen, T.P.1
-
13
-
-
84927727752
-
Security Proofs for Signature Schemes
-
D. Pointcheval, J. Stern, “Security Proofs for Signature Schemes,” Eurocrypt ’96, pp. 387-398.
-
Eurocrypt ’96
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
15
-
-
0018545449
-
How to Share a Secret
-
A. Shamir, “How to Share a Secret,” Communications of the ACM, Vol. 22, 1979, pp. 612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
33244459571
-
Secure Coprocessors in Electronic Commerce Applications
-
New York, New York, July
-
B. Yee, D. Tygar, “Secure Coprocessors in Electronic Commerce Applications,” Proceedings of the First USENIX Workshop on Electronic Commerce, New York, New York, July, 1995.
-
(1995)
Proceedings of the First USENIX Workshop on Electronic Commerce
-
-
Yee, B.1
Tygar, D.2
-
18
-
-
0004196480
-
-
Ph.D. Thesis, Carnegie Mellon University, CMU-CS-94-149
-
B. Yee, “Using Secure Coprocessors,” Ph.D. Thesis, Carnegie Mellon University, CMU-CS-94-149, 1994.
-
(1994)
Using Secure Coprocessors
-
-
Yee, B.1
|