-
2
-
-
85017331614
-
-
Efficient Algorithms, The MIT Press
-
Bach E. and Shallit J., Algorithmic Number Theory, vol. 1: Efficient Algorithms, The MIT Press, 1996, pp. 155-163.
-
(1996)
Algorithmic Number Theory
, vol.1
, pp. 155-163
-
-
Bach, E.1
Shallit, J.2
-
3
-
-
0003745894
-
Secure schemes for secret sharing and key distribution
-
Beimel A., “Secure schemes for secret sharing and key distribution", DScdissertation, 1996.
-
(1996)
Dscdissertation
-
-
Beimel, A.1
-
6
-
-
84898960610
-
Completeness theorems for non cryptographic fault tolerant distributed computation, 20th Proc
-
BenOr M., Goldwasser S. and Wigderson A., Completeness theorems for non cryptographic fault tolerant distributed computation, 20th Proc. ACM Symp. On Theory of Computing, (1988), 1-9.
-
(1988)
ACM Symp. on Theory of Computing
, pp. 1-9
-
-
Benor, M.1
Goldwasser, S.2
Wigderson, A.3
-
8
-
-
84957651500
-
A Formal Treatment of Remotely Keyed Encryption
-
Springer-Verlag
-
Blaze M,, Feigenbaum J. and Naor M., “A Formal Treatment of Remotely Keyed Encryption", Advances in Cryptology - Eurocrypt'98, LNCS 1403, Springer-Verlag, 1998, pp. 251-265.
-
(1998)
Advances in Cryptology - Eurocrypt'98
, vol.1403
, pp. 251-265
-
-
Blaze, M.1
Feigenbaum, J.2
Naor, M.3
-
9
-
-
84947778144
-
The Decision DifieHellman Problem"
-
Springer-Verlag
-
D. Boneh, “The Decision DifieHellman Problem", Proc. of the Third Algorithmic Number Theory Symp., LNCS Vol. 1423, Springer-Verlag, pp. 48-63, 1998.
-
(1998)
Proc. of the Third Algorithmic Number Theory Symp
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
-
10
-
-
0842305659
-
Towards realizing random oracles: Hash functions that hide all partial information
-
LNCS, Springer
-
Canetti R., Towards realizing random oracles: hash functions that hide all partial information, CRYPTO '97, LNCS, Springer, 1997, pp. 455-469.
-
(1997)
CRYPTO '97
, pp. 455-469
-
-
Canetti, R.1
-
12
-
-
38149135433
-
The random oracle model, revisited, to appear in: Proc
-
R. Canetti, O. Goldreich and S. Halevi, The random oracle model, revisited, to appear in: Proc. 30th Ann. ACM Symp. on Theory of Computing, 1998.
-
(1998)
30Th Ann. ACM Symp. on Theory of Computing
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
13
-
-
0005033406
-
An efficient threshold public-key cryptosystem secure against chosen ciphertext attack
-
Springer-Verlag
-
Canetti R. and Goldwasser S., “An efficient threshold public-key cryptosystem secure against chosen ciphertext attack", Advances in Cryptology - Eurocrypt '99, Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - Eurocrypt '99
-
-
Canetti, R.1
Goldwasser, S.2
-
14
-
-
84898947315
-
Multiparty unconditionally secure protocols, 20th Proc
-
Chaum D., Crepeau C. and Damgard I., Multiparty unconditionally secure protocols, 20th Proc. ACM Symp. on Theory of Computing, (1988), 11-19.
-
(1988)
ACM Symp. on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
17
-
-
0027961556
-
How to share a function securely
-
DeSantis A., Desmedt Y., Frankel Y., and Yung M., “How to share a function securely", in Proc. 26th STOC, 1994, pp. 522-533
-
(1994)
Proc. 26Th STOC
, pp. 522-533
-
-
Desantis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
19
-
-
0027341860
-
Perfectly secure message transmission"
-
Dolev D., Dwork C., Waarts O. and Yung M., “Perfectly secure message transmission", JACM 40(1):17-47, 1993.
-
(1993)
JACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
20
-
-
0031210863
-
An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement
-
Feldman P. and S. Micali, “An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement", Siam J. Comp. 26, 1997, pp. 873-933.
-
(1997)
Siam J. Comp
, vol.26
, pp. 873-933
-
-
Feldman, P.1
Micali, S.2
-
21
-
-
0011000478
-
An introduction to threshold cryptography
-
Gemmell P., “An introduction to threshold cryptography", CryptoBytes, Winter 97, 7-12, 1997.
-
(1997)
Cryptobytes, Winter
, vol.97
, pp. 7-12
-
-
Gemmell, P.1
-
22
-
-
84947926543
-
Robust threshold DSS signatures"
-
Springer-Verlag, LNCS
-
Gennaro R., Jarecki S., Krawczyk H. and Rabin T., “Robust threshold DSS signatures", Adv. in CryptologyEurocrypt '96, Springer-Verlag, LNCS 1070, 354-371.
-
Adv. in Cryptologyeurocrypt '96
, vol.1070
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
24
-
-
0022793132
-
How to construct random functions"
-
Goldreich O., Goldwasser S. and Micali S., “How to construct random functions", J. of the ACM, Vol. 33, No. 4, (1986), 691-729.
-
(1986)
J. of the ACM
, vol.33
, Issue.4
, pp. 691-729
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
26
-
-
0027617271
-
Increasing availability and security of an authentication service
-
Gong L., “Increasing availability and security of an authentication service", IEEE J. SAC, Vol. 11, No. 5, (1993), 657-662.
-
(1993)
IEEE J. SAC
, vol.11
, Issue.5
, pp. 657-662
-
-
Gong, L.1
-
30
-
-
0019608784
-
On sharing secrets and Reed-Solomon Codes
-
McEliece R. J. and Sarwate D. V., “On sharing secrets and Reed-Solomon Codes", Comm. ACM, Vol. 24, No. 9, 1981, 583-584.
-
(1981)
Comm. ACM
, vol.24
, Issue.9
, pp. 583-584
-
-
McEliece, R.J.1
Sarwate, D.V.2
-
31
-
-
84957658795
-
A simple method for generating and sharing pseudo- random functions, with applications to clipper-like key escrow systems
-
Springer
-
Micali S. and Sidney R., “A simple method for generating and sharing pseudo- random functions, with applications to clipper-like key escrow systems", Adv. In Cryptology - Crypto '95, Springer, 185-196.
-
Adv. in Cryptology - Crypto '95
, pp. 185-196
-
-
Micali, S.1
Sidney, R.2
-
32
-
-
84957701776
-
Secure and efficient metering
-
Springer-Verlag
-
Naor M. and Pinkas B., Secure and efficient metering, Advances in Cryptology - Eurocrypt '98, LNCS 1403, Springer-Verlag, 1998, pp. 576-590.
-
(1998)
Advances in Cryptology - Eurocrypt '98
, vol.1403
, pp. 576-590
-
-
Naor, M.1
Pinkas, B.2
-
35
-
-
0029510686
-
Synthesizers and their application to the parallel construction of pseudo-random functions"
-
Naor M. and O. Reingold, “Synthesizers and their application to the parallel construction of pseudo-random functions", Proc. 36th IEEE Symp. on Foundations of Computer Science, 1995, pp. 170-181.
-
(1995)
Proc. 36Th IEEE Symp. on Foundations of Computer Science
, pp. 170-181
-
-
Naor, M.1
Reingold, O.2
-
36
-
-
84937608081
-
Number-Theoretic constructions of efficient pseudo- random functions
-
Naor M. and Reingold O., “Number-Theoretic constructions of efficient pseudo- random functions", Proc. 38th IEEE FOCS, 1997.
-
(1997)
Proc. 38Th IEEE FOCS
-
-
Naor, M.1
Reingold, O.2
-
37
-
-
84957617971
-
From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs
-
Naor M. and O. Reingold, “From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs", Advances in CryptologyCRYPTO '98, 1998, pp. 267-282.
-
(1998)
Advances in Cryptologycrypto '98
, pp. 267-282
-
-
Naor, M.1
Reingold, O.2
-
38
-
-
0002957803
-
The load, capacity, and availability of quorum systems
-
April
-
Naor M. and Wool A., “The load, capacity, and availability of quorum systems", SIAM J. Comput., Vol. 27, No. 2, 423-447, April 1998.
-
(1998)
J. Comput
, vol.27
, Issue.2
, pp. 423-447
-
-
Naor, M.1
Wool, A.2
-
40
-
-
0018048246
-
Using encryption for authentication in large net- works of computers
-
December
-
Needham R. and Schroeder M., “Using encryption for authentication in large net- works of computers", Comm. ACM, Vol. 21, No. 12, 993-999, December 1978.
-
(1978)
Comm. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
41
-
-
0020829007
-
Transaction Protection by Beacons"
-
Rabin M. O., “Transaction Protection by Beacons", JCSS, Vol. 27, No. 2, (1983), 256-267.
-
(1983)
JCSS
, vol.27
, Issue.2
, pp. 256-267
-
-
Rabin, M.O.1
-
42
-
-
84957689308
-
A Simpliffied Approach to Threshold and Proactive RSA
-
Rabin T., “A Simpliffied Approach to Threshold and Proactive RSA", Advances in Cryptology - CRYPTO '98, 1998, pp. 89-104.
-
(1998)
Advances in Cryptology - CRYPTO '98
, pp. 89-104
-
-
Rabin, T.1
-
43
-
-
0000537828
-
Efficient identiffication and signatures for smart cards
-
LNCS, Springer-Verlag
-
Schnorr C. P., Efficient identiffication and signatures for smart cards, Proc. Advances in Cryptology - CRYPTO '89, LNCS, Springer-Verlag, 1990, pp. 239-252.
-
(1990)
Proc. Advances in Cryptology - CRYPTO '89
, pp. 239-252
-
-
Schnorr, C.P.1
-
44
-
-
0018545449
-
How to share a secret
-
Nov
-
Shamir A., “How to share a secret", Comm. ACM Vol. 22, No. 11 (Nov. 1979), 612-613.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|