-
1
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds
-
ACM
-
J. Bar-Ilan and D. Beaver. Non-cryptographic fault-tolerant computing in a constant number of rounds. In Proc. 8th ACM PODC, pages 201-209. ACM, 1989.
-
(1989)
Proc. 8Th ACM PODC
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
2
-
-
0002531104
-
Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations
-
ACM
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations. In Proc. 20th STOC, pages 10. ACM, 1988.
-
(1988)
Proc. 20 STOC
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
85048601848
-
Cryptographic protocols provably secure against dynamic adversaries
-
LNCS No. 658. BW. E. Berlekamp and L. Welch. Error correction of algebraic block codes. US Patent 4,633,470
-
D. Beaver and S. Haber. Cryptographic protocols provably secure against dynamic adversaries. In Eurocrypt '92, pages 307-323, 1992. LNCS No. 658. BW. E. Berlekamp and L. Welch. Error correction of algebraic block codes. US Patent 4,633,470.
-
(1992)
Eurocrypt '92
, pp. 307-323
-
-
Beaver, D.1
Haber, S.2
-
5
-
-
84898947315
-
Multiparty Unconditionally Secure Protocols
-
ACM
-
D. Chaum, C. Crepeau, and I. Damgard. Multiparty Unconditionally Secure Protocols. In Proc. 20th STOC, pages 11-19. ACM, 1988.
-
(1988)
Proc. 20Th STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
6
-
-
84957680703
-
Zero-knowledge proof for finite fields arithmetic, or: Can zero-knowledge be for free
-
1998, LNCS No. 1462
-
R. Cramer and I. Damgard. Zero-knowledge proof for finite fields arithmetic, or: Can zero-knowledge be for free. In Crypto '98, pages 424-441, 1998. LNCS No. 1462.
-
Crypto '98
, pp. 424-441
-
-
Cramer, R.1
Damgard, I.2
-
7
-
-
84957717648
-
Efficient multiparty computations with dishonest minority
-
LNCS No
-
R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations with dishonest minority. In Eurocrypt '99, pages 311-326, 1999. LNCS No.
-
(1999)
Eurocrypt '99
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
8
-
-
0029723583
-
Adaptively secure multi-party computation
-
ACM
-
Ran Canetti, Uri Feige, Oded Goldreich, and Moni Naor. Adaptively secure multi-party computation. In Proc. 28th STOC, pages 639-648. ACM, 1996.
-
(1996)
Proc. 28Th STOC
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
12
-
-
84947926543
-
Robust threshold DSS signatures
-
Full version
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In Eurocrypt '96, pages 354-371, 1996. Full version: http://www.research.ibm.com/security/DSSthresh.ps.
-
(1996)
Eurocrypt '96
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
13
-
-
49049089688
-
The (In)security of distributed key generation in dlog-based cryptosystems
-
LNCS No
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. The (in)security of distributed key generation in dlog-based cryptosystems. In Eurocrypt '99, pages 295-310, 1999. LNCS No.
-
(1999)
Eurocrypt '99
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
14
-
-
0029767165
-
On the composition of zero-knowledge proof systems
-
O. Goldreich and H. Krawczyk. On the composition of zero-knowledge proof systems. SIAM. J. Computing, 25(1), 1996.
-
(1996)
SIAM. J. Computing
, vol.25
, Issue.1
-
-
Goldreich, O.1
Krawczyk, H.2
-
15
-
-
0023985465
-
Rivest. A digital signature scheme secure against adaptive chosen-message attacks
-
Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, 17(2):281-308, April 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Ronald, L.3
-
16
-
-
0024611659
-
The knowledge complexity of interactive proof-systems
-
S. Goldwasser, S. Micali, and C. Racko_. The knowledge complexity of interactive proof-systems. SIAM. J. Computing, 18(1):186-208, February 1989.
-
(1989)
SIAM. J. Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Racko_, C.3
-
17
-
-
0031628398
-
Simpli_ed vss and fast-track multiparty computations with applications to threshold cryptography
-
ACM
-
R. Gennaro, M. Rabin, and T Rabin. Simpli_ed vss and fast-track multiparty computations with applications to threshold cryptography. In Proc. 17th ACM PODC, pages 101-112. ACM, 1998.
-
(1998)
Proc. 17Th ACM PODC
, pp. 101-112
-
-
Gennaro, R.1
Rabin, M.2
Rabin, T.3
-
18
-
-
0030646698
-
Proactive public key and signature systems
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung. Proactive public key and signature systems. In 1997 ACM Conference on Computers and Communication Security, 1997.
-
(1997)
1997 ACM Conference on Computers and Communication Security
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
20
-
-
0032319637
-
Lower bounds for zero-knowledge on the internet
-
IEEE
-
J. Kilian, E. Petrank, and C. Rackoff. Lower bounds for zero-knowledge on the internet. In Proc. 39th FOCS, pages 484-492. IEEE, 1998.
-
(1998)
Proc. 39Th FOCS
, pp. 484-492
-
-
Kilian, J.1
Petrank, E.2
Rackoff, C.3
-
21
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
LNCS No. 576
-
T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Crypto '91, pages 129-140, 1991. LNCS No. 576.
-
(1991)
Crypto '91
, pp. 129-140
-
-
Pedersen, T.1
-
22
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
LNCS No. 547
-
T. Pedersen. A threshold cryptosystem without a trusted party. In Eurocrypt '91, pages 522-526, 1991. LNCS No. 547.
-
(1991)
Eurocrypt '91
, pp. 522-526
-
-
Pedersen, T.1
-
23
-
-
84957689308
-
A simplified approach to threshold and proactive RSA
-
Tal Rabin, LNCS No. 1462
-
Tal Rabin. A simplified approach to threshold and proactive RSA. In Crypto '98, pages 89-104, 1998. LNCS No. 1462.
-
(1998)
Crypto '98
, pp. 89-104
-
-
-
24
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4:161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
|