-
1
-
-
84958639277
-
Efficient generation of shared RSA keys
-
Springer-Verlag. LNCS No. 1294. [BF97]
-
[BF97] D. Boneh and M. Franklin. Efficient generation of shared RSA keys. In Crypto '97, pages 425-439, 1997. Springer-Verlag. LNCS No. 1294.
-
(1997)
Crypto '97
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
0002181960
-
Digital Multisignatures
-
H. Baker and F. Piper, editors, Claredon Press[Boy89]
-
[Boy89] C. Boyd. Digital Multisignatures. In H. Baker and F. Piper, editors, Cryptography and Coding, pages 241-246. Claredon Press, 1989.
-
(1989)
Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
4
-
-
0013001552
-
Proactive Security: Long-term Protextion Against Break-ins
-
[CGHN97]
-
[CGHN97] R. Canetti, R. Gennaro, A. Herzberg, and D. Naor. Proactive Security: Long-term Protextion Against Break-ins. CryptoBytes, 3(1):1-8, 1997.
-
(1997)
CryptoBytes
, vol.3
, Issue.1
, pp. 1-8
-
-
Canetti, R.1
Gennaro, R.2
Herzberg, A.3
Naor, D.4
-
5
-
-
0003200675
-
Public-key cryptography and re-usable shared secrets
-
H. Baker and F. Piper, editorsClaredon Press[CH89]
-
[CH89] R. A. Croft and S. P. Harris. Public-key cryptography and re-usable shared secrets. In H. Baker and F. Piper, editors, Cryptography and Coding, pages 189-201. Claredon Press, 1989.
-
(1989)
Cryptography and Coding
, pp. 189-201
-
-
Croft, R.A.1
Harris, S.P.2
-
6
-
-
84984842401
-
Maintaining security in the presence of transient faults
-
Springer-Verlag. LNCS No. 839. [CH94]
-
[CH94] R. Canetti and Amir Herzberg. Maintaining security in the presence of transient faults. Crypto '94, pages 425-438, 1994. Springer-Verlag. LNCS No. 839.
-
(1994)
Crypto '94
, pp. 425-438
-
-
Canetti, R.1
Herzberg, A.2
-
7
-
-
0027580298
-
Efficient and secure multiparty generation of digital signatures based on discrete logarithms
-
[CMI93]
-
[CMI93] M. Cerecedo, T. Matsumoto, and H. Imai. Efficient and secure multiparty generation of digital signatures based on discrete logarithms. IEICE Trans. Fundamentals, E76-A(4):532-545, 1993.
-
(1993)
IEICE Trans. Fundamentals
, vol.E76-A
, Issue.4
, pp. 532-545
-
-
Cerecedo, M.1
Matsumoto, T.2
Imai, H.3
-
8
-
-
0027961556
-
How to share a function securely
-
ACM, [DDFY94]
-
[DDFY94] Alfredo De Santis, Yvo Desmedt, Yair Frankel, and Moti Yung. How to share a function securely. In Proc. 26th Annual Symp. on the Theory of Computing, pages 522-533. ACM, 1994.
-
(1994)
Proc. 26th Annual Symp. on the Theory of Computing
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
9
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
Berlin, Springer-Verlag. LNCS No. 293. [Des87]
-
[Des87] Yvo Desmedt. Society and group oriented cryptography: A new concept. In Crypto '87, pages 120-127, Berlin, 1987. Springer-Verlag. LNCS No. 293.
-
(1987)
Crypto '87
, pp. 120-127
-
-
Desmedt, Y.1
-
11
-
-
85023809951
-
Threshold cryptosystems
-
G. Brassard, editor, Berlin, Springer-Verlag. LNCS No. 435. [DF89]
-
[DF89] Yvo Desmedt and Yair Frankel. Threshold cryptosystems. In G. Brassard, editor, Advances in Cryptology-Crypto '89, pages 307-315, Berlin, 1989. Springer-Verlag. LNCS No. 435.
-
(1989)
Advances in Cryptology-Crypto '89
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
12
-
-
85022187530
-
Shared generation of authenticators and signatures
-
J. Feigenbaum, editor, Berlin, Springer-Verlag. LNCS No. 576. [DF91]
-
[DF91] Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures. In J. Feigenbaum, editor, Advances in Cryptology-Crypto '91, pages 457-469, Berlin, 1991. Springer-Verlag. LNCS No. 576.
-
(1991)
Advances in Cryptology-Crypto '91
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
13
-
-
0038061165
-
Redistributing secret shares to new access structures and its applications
-
George Mason University, July 1997. [DJ97]
-
[DJ97] Y. Desmedt and S. Jajodia. Redistributing secret shares to new access structures and its applications. Tech. Report ISSE-TR-97-01, George Mason University, July 1997. ftp://isse.gmu.edu/pub/techrep/97_01-jajodia.ps.gz.
-
Tech. Report ISSE-TR-97-01
-
-
Desmedt, Y.1
Jajodia, S.2
-
14
-
-
0008095081
-
-
TR-92-04-02, April, Dept, of EE and CS, U of Wisconsin, [FD92]
-
[FD92] Yair Frankel and Yvo Desmedt. Parallel reliable threshold multisignature. TR-92-04-02, April, Dept, of EE and CS, U of Wisconsin, 1992.
-
(1992)
Parallel reliable threshold multisignature
-
-
Frankel, Y.1
Desmedt, Y.2
-
15
-
-
0023538330
-
A Practical Scheme for Non-Interactive Verifiable Secret Sharing
-
IEEE, [Fel87]
-
[Fel87] P. Feldman. A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In Proc. 28th Annual FOCS, pages 427-437. IEEE, 1987.
-
(1987)
Proc. 28th Annual FOCS
, pp. 427-437
-
-
Feldman, P.1
-
16
-
-
84958676203
-
Proactive RSA
-
Springer-Verlag. LNCS No. 1294. [FGMY97a]
-
[FGMY97a] Yair Frankel, P. Gemmell, P. Mackenzie, and M. Yung. Proactive RSA. In Crypto '97, pages 440-454, 1997. Springer-Verlag. LNCS No. 1294.
-
(1997)
Crypto '97
, pp. 440-454
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
17
-
-
0031375570
-
Optimal resilience proactive public-key cryptosystems
-
IEEE, [FGMY97b]
-
[FGMY97b] Y. Frankel, P. Gemmell, P. Mackenzie, and M. Yung. Optimal resilience proactive public-key cryptosystems. In Proc. 38th FOCS, pages 384-393. IEEE, 1997.
-
(1997)
Proc. 38th FOCS
, pp. 384-393
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.3
Yung, M.4
-
18
-
-
0029713931
-
Witness-based Cryptographic Program Checking and Robust Function Sharing
-
ACM, [FGY96]
-
[FGY96] Y. Frankel, P. Gemmell, and M. Yung. Witness-based Cryptographic Program Checking and Robust Function Sharing. In Proc. 28th STOC, pages 499-508. ACM, 1996.
-
(1996)
Proc. 28th STOC
, pp. 499-508
-
-
Frankel, Y.1
Gemmell, P.2
Yung, M.3
-
19
-
-
84894281582
-
An Optimal Algorithm for Synchronous Byzantine Agreement
-
ACM, [FM88]
-
[FM88] P. Feldman and S. Micali. An Optimal Algorithm for Synchronous Byzantine Agreement. In Proc. 20th STOC, pages 148-161. ACM, 1988.
-
(1988)
Proc. 20th STOC
, pp. 148-161
-
-
Feldman, P.1
Micali, S.2
-
20
-
-
0039241746
-
A practical protocol for large group oriented networks
-
Springer-Verlag. LNCS No. 434. [Fra89]
-
[Fra89] Y. Frankel. A practical protocol for large group oriented networks. In Eurocrypt '89, pages 56-61, 1989. Springer-Verlag. LNCS No. 434.
-
(1989)
Eurocrypt '89
, pp. 56-61
-
-
Frankel, Y.1
-
21
-
-
84976655650
-
Cryptographic computation: Secure faut-tolerant protocols and the public-key model
-
Springer-Verlag. LNCS No. 293. [GHY87]
-
[GHY87] Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure faut-tolerant protocols and the public-key model. In Crypto '87, pages 135-155, 1987. Springer-Verlag. LNCS No. 293.
-
(1987)
Crypto '87
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
22
-
-
84947926543
-
Robust threshold DSS signatures
-
Springer-Verlag. LNCS No. 1070. [GJKR96a]
-
[GJKR96a] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In Eurocrypt '96, pages 354-371, 1996. Springer-Verlag. LNCS No. 1070.
-
(1996)
Eurocrypt '96
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
23
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
Springer-Verlag. LNCS No. 1109. [GJKR96b]
-
[GJKR96b] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of RSA functions. In Crypto '96, pages 157-172, 1996. Springer-Verlag. LNCS No. 1109.
-
(1996)
Crypto '96
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
24
-
-
0028508211
-
Group oriented (t,n) digital signature scheme
-
Sept [Har94]
-
[Har94] L. Ham. Group oriented (t,n) digital signature scheme. IEE Proc.-Comput.Digit. Tech, 141(5):307-313, Sept 1994.
-
(1994)
IEE Proc.-Comput.Digit. Tech
, vol.141
, Issue.5
, pp. 307-313
-
-
Ham, L.1
-
25
-
-
0030646698
-
Proactive public key and signature systems
-
+97]
-
+97] Amir Herzberg, M. Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung. Proactive public key and signature systems. In 1997 ACM Conference on Computers and Communication Security, 1997.
-
(1997)
1997 ACM Conference on Computers and Communication Security
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
27
-
-
85027164480
-
How to withstand mobile virus attacks
-
ACM, [OY91]
-
[OY91] R. Ostrovsky and M. Yung. How to withstand mobile virus attacks. In Proc. 10th PODC, pages 51-59. ACM, 1991.
-
(1991)
Proc. 10th PODC
, pp. 51-59
-
-
Ostrovsky, R.1
Yung, M.2
|