-
2
-
-
0027961556
-
How to Share a Function Securely
-
[DDFY]
-
[DDFY] A. De Santis, Y. Desmedt, Y. Frankel, M. Yung. How to Share a Function Securely. In ACM Symp. on Theory of Computing, pages 522-533, 1994.
-
(1994)
ACM Symp. On Theory of Computing
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
3
-
-
0017018484
-
New Directions in Cryptography
-
[DH76], Nov
-
[DH76] W. Diffie, M. Heilman. New Directions in Cryptography. In volume IT-22, n. 6 of IEEE Transactions on Information Theory, pages 644-654, Nov. 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Heilman, M.2
-
4
-
-
0004272148
-
-
[Du78], 2nd edition, W. H. Freeman and Co
-
[Du78] U. Dudley. Elementary Number Theory. 2nd edition, pages 36, 37, 75, 1978. W. H. Freeman and Co.
-
(1978)
Elementary Number Theory
-
-
Dudley, U.1
-
5
-
-
85032883059
-
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
[E1G85]
-
[E1G85] T. ElGamal. A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In CRYPTO ’84, pages 10-18.
-
CRYPTO ’84
, pp. 10-18
-
-
ElGamal, T.1
-
6
-
-
85023809951
-
Threshold Cryptosystems
-
[FD89]
-
[FD89] Y. Frankel, Y. Desmedt. Threshold Cryptosystems. In CRYPTO ’89, pages 307-315.
-
CRYPTO ’89
, pp. 307-315
-
-
Frankel, Y.1
Desmedt, Y.2
-
8
-
-
84990731886
-
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
-
[FS86]
-
[FS86] A. Fiat, A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In CRYPTO ’86, pages 186-194.
-
CRYPTO ’86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
9
-
-
84957693910
-
Escrow Encryption Systems Visited: Attacks, Analysis and Designs
-
[FY95]
-
[FY95] Y. Frankel, M. Yung. Escrow Encryption Systems Visited: Attacks, Analysis and Designs. In CRYPTO ’95, pages 222-235
-
CRYPTO ’95
, pp. 222-235
-
-
Frankel, Y.1
Yung, M.2
-
10
-
-
84957609490
-
On characterization of Escrow Encryption Schemes
-
[FY97]
-
[FY97] Y. Frankel, M. Yung. On characterization of Escrow Encryption Schemes. In ICALP ’97.
-
ICALP ’97
-
-
Frankel, Y.1
Yung, M.2
-
11
-
-
85034643663
-
Symmetric public-key encryption
-
[GHY85]
-
[GHY85] Z. Galil, S. Haber, M. Yung. Symmetric public-key encryption. In CRYPTO ’85, pages 128-137.
-
CRYPTO ’85
, pp. 128-137
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
14
-
-
1542385579
-
-
[K-S]
-
[K-S] H. Abelson, R. Anderson, S. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, P. Neumann, R. Rivest, J. Schiller, B. Schneier. The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption, available at http://www.crypto.com/key.study
-
The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
-
-
Abelson, H.1
Anderson, R.2
Bellovin, S.3
Benaloh, J.4
Blaze, M.5
Diffie, W.6
Gilmore, J.7
Neumann, P.8
Rivest, R.9
Schiller, J.10
Schneier, B.11
-
15
-
-
84957640277
-
Fair Cryptosystems Revisited
-
[KL95], Springer-Verlag
-
[KL95] J. Kilian and F.T. Leighton. Fair Cryptosystems Revisited. In CRYPTO ’95, pages 208-221, 1995. Springer-Verlag.
-
(1995)
CRYPTO ’95
, pp. 208-221
-
-
Kilian, J.1
Leighton, F.T.2
-
16
-
-
0012167855
-
-
[Koh78], MIT Lab. for Computer Science, Cambridge Mass., May
-
[Koh78] L. Kohnfelder. A Method for Certification. MIT Lab. for Computer Science, Cambridge Mass., May 1978.
-
(1978)
A Method for Certification
-
-
Kohnfelder, L.1
-
18
-
-
84947439162
-
A Key Escrow System with Warrant Bounds
-
[LWY95]
-
[LWY95] A. Lenstra, P. Winkler, Y. Yacobi. A Key Escrow System with Warrant Bounds. In CRYPTO ’95, pages 197-207, 1995.
-
(1995)
CRYPTO ’95
, pp. 197-207
-
-
Lenstra, A.1
Winkler, P.2
Yacobi, Y.3
-
19
-
-
0010216321
-
Fair Public-Key Cryptosystems
-
[Mi92], Springer-Verlag
-
[Mi92] S. Micali. Fair Public-Key Cryptosystems. In CRYPTO ’92, pages 113-138, 1992. Springer-Verlag.
-
(1992)
CRYPTO ’92
, pp. 113-138
-
-
Micali, S.1
-
21
-
-
84957370092
-
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals
-
[VT97]
-
[VT97] E. Verheul, H. van Tilborg. Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. In Eurocrypt ’97, pages 119-133, 1997.
-
(1997)
Eurocrypt ’97
, pp. 119-133
-
-
Verheul, E.1
van Tilborg, H.2
-
22
-
-
84955586344
-
The Dark Side of Black-Box Cryptography
-
[YY96]
-
[YY96] A. Young, M. Yung. The Dark Side of Black-Box Cryptography. In CRYPTO ’96, pages 89-103
-
CRYPTO ’96
, pp. 89-103
-
-
Young, A.1
Yung, M.2
-
23
-
-
84957360674
-
Kleptography: Using Cryptography against Cryptography
-
[YY97a]
-
[YY97a] A. Young, M. Yung. Kleptography: Using Cryptography against Cryptography. In Eurocrypt ’97, pages 62-74.
-
Eurocrypt ’97
, pp. 62-74
-
-
Young, A.1
Yung, M.2
-
24
-
-
84958645678
-
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems
-
[YY97b]
-
[YY97b] A. Young, M. Yung. The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. In CRYPTO ’97, pages 264-276.
-
CRYPTO ’97
, pp. 264-276
-
-
Young, A.1
Yung, M.2
|