-
1
-
-
84957629783
-
Relations Among Notions of Security for Public-Key Encryption Schemes
-
Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. In Crypto '98, LNCS 1462, pages 26-45. Springer-Verlag, 1998.
-
(1998)
Crypto '98
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
2
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for De- signing Efficient Protocols
-
ACM press
-
M. Bellare and P. Rogaway. Random Oracles are Practical: A Paradigm for De- signing Efficient Protocols. In Proc. of the 1st CCCS, pages 62-73. ACM press, 1993.
-
(1993)
Proc. of the 1St CCCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84948986458
-
Optimal Asymmetric Encryption -How to Encrypt with RSA
-
Springer-Verlag
-
M. Bellare and P. Rogaway. Optimal Asymmetric Encryption -How to Encrypt with RSA. In Eurocrypt '94, LNCS 950, pages 92-111. Springer-Verlag, 1995.
-
(1995)
Eurocrypt '94
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84957693225
-
A Chosen Ciphertext Attack against Protocols based on the RSA Encryption Standard PKCS #1
-
Springer-Verlag
-
D. Bleichenbacher. A Chosen Ciphertext Attack against Protocols based on the RSA Encryption Standard PKCS #1. In Crypto '98, LNCS 1462, pages 1-12. Springer-Verlag, 1998.
-
(1998)
Crypto '98
, vol.1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
5
-
-
84957610823
-
Speedings up Discrete Log and Factor- ing Based Schemes via Precomputations
-
Springer- Verlag
-
V. Boyko, M. Peinado, and R. Venkatesan. Speedings up Discrete Log and Factor- ing Based Schemes via Precomputations. In Eurocrypt '98, LNCS 1403. Springer- Verlag, 1998.
-
(1998)
Eurocrypt '98
, vol.1403
-
-
Boyko, V.1
Peinado, M.2
Venkatesan, R.3
-
7
-
-
84947902524
-
Low-Exponent RSA with Related Messages
-
Springer-Verlag
-
D. Coppersmith, M. Franklin, J. Patarin, and M. Reiter. Low-Exponent RSA with Related Messages. In Eurocrypt '96, LNCS 1070, pages 1-9. Springer-Verlag, 1996.
-
(1996)
Eurocrypt '96
, vol.1070
, pp. 1-9
-
-
Coppersmith, D.1
Franklin, M.2
Patarin, J.3
Reiter, M.4
-
8
-
-
84870707379
-
A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
-
Springer-Verlag
-
R. Cramer and V. Shoup. A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In Crypto '98, LNCS 1462, pages 13-25. Springer-Verlag, 1998.
-
(1998)
Crypto '98
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
11
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
July
-
T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In IEEE Transactions on Information Theory, volume IT-31, no. 4, pages 469-472, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
13
-
-
0023985175
-
Solving Simultaneous Modular Equations of Low Degree
-
J. Håstad. Solving Simultaneous Modular Equations of Low Degree. SIAM Journal of Computing, 17:336-341, 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, pp. 336-341
-
-
Håstad, J.1
-
14
-
-
84957714507
-
-
Formal Protocol Deffinition, may, Available from
-
SET Secure Electronic Transaction LLC. SET Secure Electronic Transaction Speciffication -Book 3: Formal Protocol Deffinition, may 1997. Available from http://www.setco.org/.
-
(1997)
SET Secure Electronic Transaction Speciffication -Book
, vol.3
-
-
-
15
-
-
0032218237
-
A New Cryptosystem based on Higher Residues
-
ACM press
-
D. Naccache and J. Stern. A New Cryptosystem based on Higher Residues. In Proc. of the 5th CCCS, pages 59-66. ACM press, 1998.
-
(1998)
Proc. of the 5Th CCCS
, pp. 59-66
-
-
Naccache, D.1
Stern, J.2
-
16
-
-
0024983231
-
Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks
-
ACM Press
-
M. Naor and M. Yung. Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. In Proc. of the 22nd STOC, pages 427-437. ACM Press, 1990.
-
(1990)
Proc. of the 22Nd STOC
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
17
-
-
84956852274
-
A New Public Key Cryptosystem as Secure as Factoring
-
Springer-Verlag
-
T. Okamoto and S. Uchiyama. A New Public Key Cryptosystem as Secure as Factoring. In Eurocrypt '98, LNCS 1403, pages 308-318. Springer-Verlag, 1998.
-
(1998)
Eurocrypt '98
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
18
-
-
0000277371
-
Public-Key Cryptosystems Based on Discrete Logarithms Residues
-
Springer-Verlag
-
P. Paillier. Public-Key Cryptosystems Based on Discrete Logarithms Residues. In Eurocrypt '99, LNCS 1592, pages 221-236. Springer-Verlag, 1999.
-
(1999)
Eurocrypt '99
, vol.1592
, pp. 221-236
-
-
Paillier, P.1
-
19
-
-
84974554584
-
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
-
Springer- Verlag
-
C. Racko_ and D. R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In Crypto '91, LNCS 576, pages 433-444. Springer- Verlag, 1992.
-
(1992)
Crypto '91
, vol.576
, pp. 433-444
-
-
Racko_, C.1
Simon, D.R.2
-
20
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
-
February
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
22
-
-
0001977576
-
The Computational Complexity of Continued Fractions
-
V. Strassen. The Computational Complexity of Continued Fractions. SIAM Jour- nal of Computing, 12(1):1-27, 1983.
-
(1983)
SIAM Jour- Nal of Computing
, vol.12
, Issue.1
, pp. 1-27
-
-
Strassen, V.1
-
23
-
-
0005044302
-
On the Security of El Gamal based Encryption
-
LNCS. Springer-Verlag
-
Y. Tsiounis and M. Yung. On the Security of El Gamal based Encryption. In PKC '98, LNCS. Springer-Verlag, 1998.
-
(1998)
PKC '98
-
-
Tsiounis, Y.1
Yung, M.2
|