-
1
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 4:75-122, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 75-122
-
-
Beaver, D.1
-
3
-
-
84958639277
-
Eff cient generation of shared RSA keys
-
B. S. Kaliski Jr., editor, Springer-Verlag
-
D. Boneh and M. Franklin. Eff cient generation of shared RSA keys. In B. S. Kaliski Jr., editor, Advances in Cryptology - CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 425-439. Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology - CRYPTO '97, Volume 1294 of Lecture Notes in Computer Science
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
84957712291
-
An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
-
Jacques Stern, editor, Springer-Verlag
-
R. Canetti and S. Goldwasser. An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. In Jacques Stern, editor, Advances in Cryptology - EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 90-106. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT '99, Volume 1592 of Lecture Notes in Computer Science
, pp. 90-106
-
-
Canetti, R.1
Goldwasser, S.2
-
5
-
-
0027580298
-
Efficient and secure multiparty generation of digital signatures based on discrete logarithms
-
M. Cerecedo, T. Matsumoto, and H. Imai. Efficient and secure multiparty generation of digital signatures based on discrete logarithms. IEICE Transaction of Fundamentals of electronic Communications and Computer Science, E76-A. (4):532-545, April 1993.
-
(1993)
IEICE Transaction of Fundamentals of Electronic Communications and Computer Science
, vol.E76-A
, Issue.4
, pp. 532-545
-
-
Cerecedo, M.1
Matsumoto, T.2
Imai, H.3
-
7
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
Jacques Stern, editor, Springer-Verlag
-
R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations secure against an adaptive adversary. In Jacques Stern, editor, Advances in Cryptology - EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 311-326. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT '99, Volume 1592 of Lecture Notes in Computer Science
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
8
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
W. Fumy, editor, Springer-Verlag
-
R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multi-authority election scheme. In W. Fumy, editor, Advances in Cryptology - EUROCRYPT '97, volume 1233 of Lecture Notes in Computer Science, pages 103-118. Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology - EUROCRYPT '97, Volume 1233 of Lecture Notes in Computer Science
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
9
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
H. Krawczyk, editor, Springer-Verlag
-
R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pages 13-25. Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology - CRYPTO '98, Volume 1462 of Lecture Notes in Computer Science
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
10
-
-
85023809951
-
Threshold cryptosystems
-
G. Brassard, editor, Springer-Verlag
-
Y. G. Desmedt and Y. Frankel. Threshold cryptosystems. In G. Brassard, editor, Advances in Cryptology - CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 307-315. Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology - CRYPTO '89, Volume 435 of Lecture Notes in Computer Science
, pp. 307-315
-
-
Desmedt, Y.G.1
Frankel, Y.2
-
13
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. M. Odlyzko, editor, Springer-Verlag
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In A. M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, volume 263 of Lecture Notes in Computer Science, pages 186-199. Springer-Verlag, 1986.
-
(1986)
Advances in Cryptology - CRYPTO '86, Volume 263 of Lecture Notes in Computer Science
, pp. 186-199
-
-
Fiat, A.1
Shamir, A.2
-
15
-
-
84947926543
-
Robust threshold DSS signatures
-
U. Maurer, editor, e, Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In U. Maurer, editor, Advances in Cryptology - EUROCRYPT '96, volume 1070 of Lecture Notes in Computer Science, pages 354-371. Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology - EUROCRYPT '96, Volume 1070 of Lecture Notes in Computer Scienc
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
16
-
-
49049089688
-
Secure distributed key generation for discrete-log based cryptosystems
-
Jacques Stern, editor, Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. In Jacques Stern, editor, Advances in Cryptology - EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 295-310. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT '99, Volume 1592 of Lecture Notes in Computer Science
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
19
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
D. Coppersmith, editor, Springer-Verlag
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing or: How to cope with perpetual leakage. In D. Coppersmith, editor, Advances in Cryptology - CRYPTO '95, volume 963 of Lecture Notes in Computer Science, pages 339-352. Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology - CRYPTO '95, Volume 963 of Lecture Notes in Computer Science
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
20
-
-
84976810569
-
Reaching agreement in the presence of faults
-
M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 2(27):228-234, 1980.
-
(1980)
Journal of the ACM
, vol.2
, Issue.27
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
21
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
D. W. Davies, editor, Springer-Verlag
-
T. P. Pedersen. A threshold cryptosystem without a trusted party. In D. W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, volume 547 of Lecture Notes in Computer Science, pages 522-526. Springer-Verlag, 1991.
-
(1991)
Advances in Cryptology - EUROCRYPT '91, Volume 547 of Lecture Notes in Computer Science
, pp. 522-526
-
-
Pedersen, T.P.1
-
22
-
-
84982943258
-
Non-interactive and information-theoretic secure veriffable secret sharing
-
J. Feigenbaum, editor, Springer-Verlag
-
T. P. Pedersen. Non-interactive and information-theoretic secure veriffable secret sharing. In J. Feigenbaum, editor, Advances in Cryptology - CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 129-140. Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology - CRYPTO '91, Volume 576 of Lecture Notes in Computer Science
, pp. 129-140
-
-
Pedersen, T.P.1
-
25
-
-
84888872516
-
Securing threshold cryptosystems against chosen ciphertext attack
-
K. Nyberg, editor, Springer-Verlag
-
V. Shoup and R. Gennaro. Securing threshold cryptosystems against chosen ciphertext attack. In K. Nyberg, editor, Advances in Cryptology - EUROCRYPT '98, Lecture Notes in Computer Science, pages 16. Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology - EUROCRYPT '98, Lecture Notes in Computer Science
-
-
Shoup, V.1
Gennaro, R.2
|