-
1
-
-
33746365751
-
Secure Multi-party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority
-
D. Beaver, “Secure Multi-party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority", J. Cryptology (1991) 4: 75-122.
-
(1991)
J. Cryptology
, vol.4
, pp. 75-122
-
-
Beaver, D.1
-
2
-
-
0002665938
-
Hiding instances in multi-oracle queries
-
D. Beaver and J. Feigenbaum, “Hiding instances in multi-oracle queries", STACS, 1990.
-
(1990)
STACS
-
-
Beaver, D.1
Feigenbaum, J.2
-
4
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, “Relations among notions of security for public-key encryption schemes", CRYPTO '98, 1998, pp. 26-40.
-
(1998)
CRYPTO '98
, pp. 26-40
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
5
-
-
84948986458
-
Optimal Asymmetric Encryption
-
M. Bellare and P. Rogaway, “Optimal Asymmetric Encryption", Eurocrypt '94 (LNCS 950), 92-111, 1995.
-
(1995)
Eurocrypt '94
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84898960610
-
Completeness Theorems for Non- Cryptographic Fault-Tolerant Distributed Computation
-
M. Ben-Or, S. Goldwasser and A. Wigderson, “Completeness Theorems for Non- Cryptographic Fault-Tolerant Distributed Computation", 20th STOC, 1988, pp. 1-10.
-
(1988)
20Th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
84957651500
-
A formal treatment of remotely keyed encryption
-
251-165
-
M. Blaze, J. Feigenbaum and M. Naor, “A formal treatment of remotely keyed encryption", Eurocrypt '98, 1998, pp. 251-165.
-
(1998)
Eurocrypt '98
-
-
Blaze, M.1
Feigenbaum, J.2
Naor, M.3
-
8
-
-
0010280770
-
An efficient off-line electronic cash system based on the representa- tion problem
-
S. Brands, “An efficient off-line electronic cash system based on the representa- tion problem", CWI TR CS-R9323, 1993.
-
(1993)
CWI TR CS-R9323
-
-
Brands, S.1
-
10
-
-
84957664413
-
Adaptively Secure Computa- tion", 28th STOC, 1996
-
R. Canetti, U. Feige, O. Goldreich and M. Naor, “Adaptively Secure Computa- tion", 28th STOC, 1996. Fuller version in MIT-LCS-TR #682, 1996.
-
(1996)
Fuller Version in MIT-LCS-TR #682
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
11
-
-
0000739627
-
Maintaining security in the presence of transient faults
-
R. Canetti and A. Herzberg, “Maintaining security in the presence of transient faults", CRYPTO'94, 1994.
-
(1994)
CRYPTO'94
-
-
Canetti, R.1
Herzberg, A.2
-
13
-
-
84898947315
-
Multi-party Unconditionally Secure Protocols
-
D. Chaum, C. Crepeau, and I. Damgard, “Multi-party Unconditionally Secure Protocols", 20th STOC, 1998, pp. 11-19.
-
(1998)
20Th STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
14
-
-
85023982750
-
An improved protocol for demon- strating possession of discrete logarithms and some generalizations
-
D. Chaum, E. Everetse and J. van der Graaf, “An improved protocol for demon- strating possession of discrete logarithms and some generalizations", Eurocrypt '87,, LNCS 304, 1987, pp. 127-141.
-
(1987)
Eurocrypt '87
, vol.304
, pp. 127-141
-
-
Chaum, D.1
Everetse, E.2
Van Der Graaf, J.3
-
15
-
-
0002391080
-
Untraceable electronic cash
-
D. Chaum, A. Fiat and M. Naor, “Untraceable electronic cash", CRYPTO '88, LNCS 403, 1988, pp. 319-327.
-
(1988)
CRYPTO '88
, vol.403
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
16
-
-
85001025766
-
Wallet databases with observers
-
D. Chaum and T. Pedersen, “Wallet databases with observers", CRYPTO '92, 1992, pp. 89-105.
-
(1992)
CRYPTO '92
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.2
-
17
-
-
0002766455
-
A paractical public-key cryptosystem provably secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup, “A paractical public-key cryptosystem provably secure against adaptive chosen ciphertext attack", CRYPTO '98, 1998.
-
(1998)
CRYPTO '98
-
-
Cramer, R.1
Shoup, V.2
-
18
-
-
85023809951
-
Threshold cryptosystems
-
Y. Desmedt and Y. Frankel, “Threshold cryptosystems", Crypto '89 (LNCS 435), 1989, pages 307-315.
-
(1989)
Crypto '89
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
20
-
-
0023538330
-
A practical scheme for non-interactive Veriffiable Secret Sharing
-
P. Feldman, “A practical scheme for non-interactive Veriffiable Secret Sharing", 28th FOCS, 1987, pp. 427-437.
-
(1987)
28Th FOCS
, pp. 427-437
-
-
Feldman, P.1
-
21
-
-
84990731886
-
How to prove yourself: Practical solutions to identiffi- cation and signature problems
-
A. Fiat and A. Shamir, “How to prove yourself: Practical solutions to identiffi- cation and signature problems", CRYPTO'86 (LNCS 263), 186-194, 1986.
-
(1986)
CRYPTO'86
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
23
-
-
84949189366
-
Secure Distributed Storage and Retrieval
-
Lecture Notes in Computer Science
-
J. Garay, R. Gennaro, C. Jutla and T. Rabin, “Secure Distributed Storage and Retrieval" Proceedings of 11th International Workshop on Distributed Algo- rithms (WDAG97) Lecture Notes in Computer Science 1320, pp. 275-289, 1997.
-
(1997)
Proceedings of 11Th International Workshop on Distributed Algo- Rithms (WDAG97)
, vol.1320
, pp. 275-289
-
-
Garay, J.1
Gennaro, R.2
Jutla, C.3
Rabin, T.4
-
24
-
-
84947441722
-
Robust and efficient shar- ing of RSA functions
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, “Robust and efficient shar- ing of RSA functions, CRYPTO '96, 1996, pp. 157-172.
-
(1996)
CRYPTO '96
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
25
-
-
84888872516
-
Securing threshold cryptosystems against chosen ciphertext attack
-
R. Gennaro and V. Shoup, “Securing threshold cryptosystems against chosen ciphertext attack", Eurocrypt '98, 1998, pp. 1-16.
-
(1998)
Eurocrypt '98
, pp. 1-16
-
-
Gennaro, R.1
Shoup, V.2
-
27
-
-
0012527958
-
Fair Computation of General Functions in Pres- ence of Immoral Majority
-
S. Goldwasser, and L. Levin, “Fair Computation of General Functions in Pres- ence of Immoral Majority", CRYPTO, 1990.
-
(1990)
CRYPTO
-
-
Goldwasser, S.1
Levin, L.2
-
28
-
-
0021409284
-
Probabilistic encryption
-
April
-
S. Goldwasser and S. Micali, “Probabilistic encryption", JCSS, Vol. 28, No 2, April 1984, pp. 270-299.
-
(1984)
JCSS
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
29
-
-
84957626176
-
Proactive Secret Sharing or: How to Cope with Perpetual Leakage
-
A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung “Proactive Secret Sharing or: How to Cope with Perpetual Leakage", CRYPTO '95, LNCS 963, 1995. pp. 339-352.
-
(1995)
CRYPTO '95
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
33
-
-
0024983231
-
Public key cryptosystems provably secure against chosen ciphertext attacks
-
M. Naor and M. Yung, “Public key cryptosystems provably secure against chosen ciphertext attacks", 22nd STOC, 427-437, 1990.
-
(1990)
22Nd STOC
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
34
-
-
85027164480
-
How to withstand mobile virus attacks
-
R. Ostrovsky and M. Yung. “How to withstand mobile virus attacks". 10th PODC, 1991, pp. 51-59.
-
(1991)
10Th PODC
, pp. 51-59
-
-
Ostrovsky, R.1
Yung, M.2
-
35
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
T. Pedersen, “A threshold cryptosystem without a trusted party", Eurocrypt '91, 1991, pp. 522-526.
-
(1991)
Eurocrypt '91
, pp. 522-526
-
-
Pedersen, T.1
-
36
-
-
0000129601
-
Distributed provers with applications to undeniable signatures
-
T. Pedersen. Distributed provers with applications to undeniable signatures. Eurocrypt '91, 1991.
-
(1991)
Eurocrypt '91
-
-
Pedersen, T.1
-
37
-
-
0024859552
-
Veriffiable Secret Sharing and Multi-party Protocols with Honest Majority
-
T. Rabin and M. Ben-Or, “Veriffiable Secret Sharing and Multi-party Protocols with Honest Majority", 21st STOC, 1989, pp. 73-85.
-
(1989)
21St STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
38
-
-
0002360237
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
C. Racko_ and D. Simon, “Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack", CRYPTO '91, 1991.
-
(1991)
CRYPTO '91
-
-
Racko_, C.1
Simon, D.2
-
39
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. “How to Share a Secret", Communications of the ACM, 22:612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
40
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. Schnorr, “Efficient signature generation by smart cards", J. Cryptology 4:161- 174, 1991.
-
(1991)
J. Cryptology
, vol.4
-
-
Schnorr, C.1
-
41
-
-
84957623411
-
-
17th Conf. on Foundations of Software Technology and Theoretical Computer Science, Kharapur, India, Available on-line at theory.lcs.mit.edu/~madhu/
-
M. Sudan, “Algorithmic issues in coding theorey", 17th Conf. on Foundations of Software Technology and Theoretical Computer Science, Kharapur, India, 1997. Available on-line at theory.lcs.mit.edu/~madhu/
-
(1997)
Algorithmic Issues in Coding Theorey
-
-
Sudan, M.1
|