-
2
-
-
85024585723
-
Incremental Cryptography: The Case of Hashing and Signing
-
Springer-Verlag
-
M. Bellare, O. Goldreich, S. Goldwasser: Incremental Cryptography: The Case of Hashing and Signing, Crypto’94, Lecture Notes in Computer Science, Vol. 839, Springer-Verlag, pp. 216-233, 1994.
-
(1994)
Crypto’94, Lecture Notes in Computer Science
, vol.839
, pp. 216-233
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
4
-
-
84954417747
-
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions
-
Springer-Verlag
-
M. Bellare, R. Guerin, P. Rogaway: XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions, Crypto’95, Lecture Notes in Computer Science, Vol. 963, Springer-Verlag, pp. 15-29, extended version available at http://www.es.ucdavis.edu/'rogaway/, 1995.
-
(1995)
Crypto’95, Lecture Notes in Computer Science
, vol.963
, pp. 15-29
-
-
Bellare, M.1
Guerin, R.2
Rogaway, P.3
-
5
-
-
84983089516
-
On the Security of Cipher Block Chaining
-
M. Bellare, J. Killian, P. Rogaway: On the Security of Cipher Block Chaining, Crypto’94, Lecture Notes in Computer Science, Vol. 839, pp. 341-358, 1994.
-
(1994)
Crypto’94, Lecture Notes in Computer Science
, vol.839
, pp. 341-358
-
-
Bellare, M.1
Killian, J.2
Rogaway, P.3
-
6
-
-
0026405370
-
Checking the Correctness of Memories
-
M. Blum, W. Evans, P. Gemmell, S. Kannan, M. Naor: Checking the Correctness of Memories, Proceedings of the 32nd IEEE Symposium on Foundations of Computer Science, pp. 90-99, 1991.
-
(1991)
Proceedings of the 32Nd IEEE Symposium on Foundations of Computer Science
, pp. 90-99
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
7
-
-
0028482823
-
-
M. Blum, W. Evans, P. Gemmell, S. Kannan, M. Naor: Checking the Correctness of Memories, Algorithmica, Volume 12, pp. 225-244, 1994.
-
(1994)
Checking the Correctness of Memories, Algorithmica
, vol.12
, pp. 225-244
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
9
-
-
0022793132
-
How to Construct Random Fun-tions
-
VP-792-807
-
O. Goldreich, S. Goldwasser, S. Micali: How to Construct Random Fun-tions, Journal of ACM, Vol. 33(4), VP-792-807, 1986.
-
(1986)
Journal of ACM
, vol.33
, Issue.4
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
10
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof Systems
-
S. Goldwasser, S. Micali, C. Rackoff: The Knowledge Complexity of Interactive Proof Systems, SIAM Journal on Computation, Vol. 18, pp. 186-208, 1989.
-
(1989)
SIAM Journal on Computation
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
11
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen Message Attacks
-
S. Goldwasser, S. Micali, R.L. Rivest: A Digital Signature Scheme Secure Against Adaptive Chosen Message Attacks, SIAM Journal on Computation, Vol. 17(2), pp. 281-308, 1988.
-
(1988)
SIAM Journal on Computation
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
12
-
-
0030149547
-
Software Protection and Simulation on Oblivious RAM
-
O. Goldreich, R. Ostrovsky: Software Protection and Simulation on Oblivious RAM, Journal of ACM, Vol. 43(3), pp. 431-473, 1996.
-
(1996)
Journal of ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
|