-
2
-
-
85062838317
-
Safeguarding Cryptographic Keys
-
G.R. Blkley, Safeguarding Cryptographic Keys, AFIPS Con. Proc (v. 48), 1979, pp 313-317.
-
(1979)
AFIPS Con. Proc
, vol.48
, pp. 313-317
-
-
Blkley, G.R.1
-
3
-
-
84984842401
-
Maintaining Security in the Presence of Transient Faults
-
(LNCS 839)
-
R. Canetti and A. Herzberg, Maintaining Security in the Presence of Transient Faults, Proc. Crypto'94 (LNCS 839), pp. 425-438.
-
Proc. Crypto'94
, pp. 425-438
-
-
Canetti, R.1
Herzberg, A.2
-
5
-
-
0003027707
-
Verifiable Secret Sharing and Achieving Simultaneoxis Broadcast
-
B. Chor, S. Goldwasser, S. Micali and B. Awerbuch, Verifiable Secret Sharing and Achieving Simultaneoxis Broadcast, Proc. of IEEE Foes 1985, pp. 335-344.
-
(1985)
Proc. of IEEE Foes
, pp. 335-344
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
6
-
-
0021522644
-
How to Construct Cryptographically Strong Sequences of Pseudorandom Bits
-
M. Blum and S. Micali, How to Construct Cryptographically Strong Sequences of Pseudorandom Bits. SIAM J. Comp. 13, 1984.
-
(1984)
SIAM J. Comp
, pp. 13
-
-
Blum, M.1
Micali, S.2
-
8
-
-
85023809951
-
Threshold cryptosystems
-
In G. Brassard, editor, (Lecture Notes in Computer Science 435), Springer-Verlag
-
Y. Desmedt and Y. Frankel, Threshold cryptosystems, In G. Brassard, editor, Advances in Cryptology, Proc. of Crypto '89 (Lecture Notes in Computer Science 435), pages 307-315. Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology, Proc. of Crypto '89
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
9
-
-
80052079244
-
Perfectly Secure Message Transmission
-
(also JACM)
-
D. Dolev, C. Dwork, O. Waarts, and M. Yung, Perfectly Secure Message Transmission, Proc. 31st Annual Symposium on the Foundations of Computer Science, 1990, (also JACM).
-
(1990)
Proc. 31st Annual Symposium on the Foundations of Computer Science
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
10
-
-
84874800178
-
A Public key cryptosystem and a signature scheme based on discrete logarithm
-
T. El Gamal, A Public key cryptosystem and a signature scheme based on discrete logarithm, IEEE TVans. on Information Theory 31, 465-472, 1985.
-
(1985)
IEEE TVans. on Information Theory
, vol.31
, pp. 465-472
-
-
El Gamal, T.1
-
12
-
-
0021409284
-
Probabilistic Encryption, 3
-
S. Goldwasser and S. Micali, Probabilistic Encryption, 3. Com. Sys. Sci. 28 (1984), pp 270-299.
-
(1984)
Com. Sys. Sci
, vol.28
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
13
-
-
0023985465
-
A Secure Digital Signature Scheme
-
S. Goldwasser, S. Micali and R, Rivest, A Secure Digital Signature Scheme, Siam Journal on Computing, Vol. 17, 2 (1988), pp. 281-308.
-
(1988)
Siam Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
14
-
-
84947723836
-
-
draft
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk and M. Yung, Proactive Public Key and Signatures Systems, draft.
-
Proactive Public Key and Signatures Systems
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
15
-
-
0023985034
-
The Discrete Log. Problem Hides 0(Log N) Bits
-
D.L. Long and A. Wigderson, The Discrete Log. Problem Hides 0(Log N) Bits. SIAM J. Comp. 17, 1988, pp. 363-372.
-
(1988)
SIAM J. Comp
, vol.17
, pp. 363-372
-
-
Long, D.L.1
Wigderson, A.2
-
16
-
-
84876222959
-
Distributed Provers with Applications to Undeniable Signature
-
(LNCS 547)
-
T. P. Pedersen, Distributed Provers with Applications to Undeniable Signature, Proc. Eurocrypt '91 (LNCS 547), pp. 221-242.
-
Proc. Eurocrypt '91
, pp. 221-242
-
-
Pedersen, T.P.1
-
17
-
-
84982943258
-
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
-
(LNCS 576)
-
T. P. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Proc. Crypto'91 (LNCS 576), pp. 129-140.
-
Proc. Crypto'91
, pp. 129-140
-
-
Pedersen, T.P.1
-
19
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret, Commun. ACM, 22 (1979), pp 612-613.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|