-
1
-
-
84957081032
-
-
Proc. of CRYPTO 98
-
B. Aiello, M. Bellare, G. Di Crescenzo, and R. Venkatesan, Security amplification by composition: the case of doubly-iterated, ideal ciphers, Proc. of CRYPTO 98.
-
Security amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers
-
-
Aiello, B.1
Bellare, M.2
Di Crescenzo, G.3
Venkatesan, R.4
-
5
-
-
84957082826
-
-
full version of this paper, available from authors
-
G. Di Crescenzo, N. Ferguson, R. Impagliazzo, and M. Jakobsson, How to forget a secret, full version of this paper, available from authors.
-
How to Forget a Secret
-
-
Di Crescenzo, G.1
Ferguson, N.2
Impagliazzo, R.3
Jakobsson, M.4
-
6
-
-
1542593353
-
-
W. Dié, P. Van Oorschot, and M. Wiener, Authentication and authenticated key exchanges, Design, Codes and Cryptography, vol. 2, 1992.
-
(1992)
Authentication and Authenticated Key Exchanges, Design, Codes and Cryptography
, vol.2
-
-
Dié, W.1
Van Oorschot, P.2
Wiener, M.3
-
9
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser and S. Micali, How to construct random functions, Journal of the ACM, Vol. 33, No. 4, 210-217, (1986).
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
10
-
-
0030149547
-
Software protection and simulation by oblivious RAMs
-
O. Goldreich and R. Ostrovsky, Software protection and simulation by oblivious RAMs, Journal of the ACM, 1996.
-
(1996)
Journal of the ACM
-
-
Goldreich, O.1
Ostrovsky, R.2
-
11
-
-
84957055951
-
-
to appear (previous versions: FOCS 89, and STOC 90)
-
J. Hastad, R. Impagliazzo, L. Levin, and M. Luby, Construction of a pseudorandom generator from any one-way function, SIAM Journal on Computing, to appear (previous versions: FOCS 89, and STOC 90).
-
Construction of a Pseudorandom Generator from Any One-Way Function, SIAM Journal on Computing
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
12
-
-
84947723836
-
-
Proc. of ACM CCS 97
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, M. Yung, Proactive public key and signature systems, Proc. of ACM CCS 97.
-
Proactive Public Key and Signature Systems
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
13
-
-
0000299804
-
-
Proc. of CRYPTO '95
-
A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, Proactive secret sharing, or how to cope with perpetual leakage, Proc. of CRYPTO '95.
-
Proactive Secret Sharing, Or How to Cope with Perpetual Leakage
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
14
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
April
-
M. Luby and C. Rackoff, How to construct pseudorandom permutations from pseudorandom functions, SIAM Journal on Computing, Vol. 17, No. 2, April 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
-
-
Luby, M.1
Racko, C.2
-
15
-
-
84877846965
-
Digital signature standard (DSS)
-
Aug 30
-
National Institute for Standards and Technology, Digital signature standard (DSS), Federal Register Vol. 56 (169), Aug 30, 1991.
-
(1991)
Federal Register
, vol.56
, Issue.169
-
-
|