-
1
-
-
84947906522
-
-
Advances in Cryptology: Proceedings of Eurocrypt’96, Lecture Notes in Computer Science 1070, Springer-Verlag
-
M. Bellare, P. Rogaway, ”The Exact Security of Digital Signatures, How to Sign with RSA and Rabin”, Advances in Cryptology: Proceedings of Eurocrypt’96, Lecture Notes in Computer Science 1070, Springer-Verlag, pp.399-416, 1996
-
(1996)
The Exact Security of Digital Signatures, How to Sign with RSA and Rabin
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
M. Ben-Or, S. Goldwasser, A. Wigderson, ”Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation”, In Proceedings of the 20th ACM Symposium on the Theory of Computing, pp.1-10, 1988.
-
(1988)
Proceedings of the 20Th ACM Symposium on the Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
85030481487
-
-
Advances in Cryptology: Proceedings of Eurocrypt’91, Lecture Notes in Computer Science 547, Springer-Verlag
-
S. Berkovits, ”How to Broadcast a Secret”, Advances in Cryptology: Proceedings of Eurocrypt’91, Lecture Notes in Computer Science 547, Springer-Verlag, pp.535-541, 1991.
-
(1991)
”How to Broadcast a Secret”
, pp. 535-541
-
-
Berkovits, S.1
-
4
-
-
84884730529
-
-
Advances in Cryptology: Proceedings of Eurocrypt’84, Lecture Notes in Computer Science 196, Springer-Verlag
-
R. Blom, ”An Optimal Class of Symmetric Key Generation Systems”, Advances in Cryptology: Proceedings of Eurocrypt’84, Lecture Notes in Computer Science 196, Springer-Verlag, pp.335-338, 1985.
-
(1985)
An Optimal Class of Symmetric Key Generation Systems
, pp. 335-338
-
-
Blom, R.1
-
5
-
-
85028765277
-
-
Advances in Cryptology: Proceedings of Crypto’92, Lecture Notes in Computer Science 740, Springer-Verlag
-
C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung, ”Perfectly-Secure Key Distribution for Dynamic Conferences”, Advances in Cryptology: Proceedings of Crypto’92, Lecture Notes in Computer Science 740, Springer-Verlag, pp.471-486, 1993.
-
(1993)
Perfectly-Secure Key Distribution for Dynamic Conferences
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
6
-
-
84955621986
-
”Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Problems”, Advances in Cryptology: Proceedings of Crypto’96, Lecture Notes in Computer Science 1109
-
D. Boneh, R. Venkatesan, ”Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Problems”, Advances in Cryptology: Proceedings of Crypto’96, Lecture Notes in Computer Science 1109, Springer-Verlag, pp.129-142, 1996.
-
(1996)
Springer-Verlag
, pp. 129-142
-
-
Boneh, D.1
Venkatesan, R.2
-
7
-
-
84948991087
-
-
Advances in Cryptology: Proceedings of Eurocrypt’94, Lecture Notes in Computer Science 950, Springer-Verlag
-
M. Burmester, Y. Desmedt, ”A Secure and Efficient Conference Key Distribution System”, Advances in Cryptology: Proceedings of Eurocrypt’94, Lecture Notes in Computer Science 950, Springer-Verlag, pp.275-286, 1995.
-
(1995)
”A Secure and Efficient Conference Key Distribution System”
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
8
-
-
84984842401
-
”Maintaining Security in the Presence of Transient Faults”
-
R. Canetti, A. Herzberg, ”Maintaining Security in the Presence of Transient Faults”, Advances in Cryptology: Proceedings of Crypto’94, Lecture Notes in Computer Science 839, Springer-Verlag, pp.425-438, 1994.
-
(1994)
Advances in Cryptology: Proceedings of Crypto’94, Lecture Notes in Computer Science 839, Springer-Verlag
, pp. 425-438
-
-
Canetti, R.1
Herzberg, A.2
-
9
-
-
0030383443
-
C.H. Lin, ”How to Converse Securely in a Conference”
-
C.C. Chang, C.H. Lin, ”How to Converse Securely in a Conference”, In Proceedings of IEEE Security Technology, 30th Annual 1996 International Carnahan Conference, pp.42-45, 1996.
-
(1996)
Proceedings of IEEE Security Technology, 30Th Annual 1996 International Carnahan Conference
, pp. 42-45
-
-
Chang, C.C.1
-
10
-
-
84957801156
-
”The Design of a Conference Key Distribution System”, Advances in Cryptology: Proceedings of Auscrypt’92
-
C.C. Chang, T.C. Wu, C.P. Chen, ”The Design of a Conference Key Distribution System”, Advances in Cryptology: Proceedings of Auscrypt’92, Lecture Notes in Computer Science 718, Springer-Verlag, pp.459-466, 1992.
-
(1992)
Lecture Notes in Computer Science 718, Springer-Verlag
, pp. 459-466
-
-
Chang, C.C.1
Wu, T.C.2
Chen, C.P.3
-
11
-
-
0017018484
-
New Directions in Cryptography
-
W. Diffie, M. Hellman, ”New Directions in Cryptography”, IEEE Transaction of Information Theory, Vol. IT-22, pp.644-654, 1976.
-
(1976)
IEEE Transaction of Information Theory
, vol.22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
12
-
-
44449153600
-
-
Advances in Cryptology: Proceedings of Crypto’98, Lecture Notes in Computer Science 1462, Springer-Verlag
-
M. Fitzi, M. Hirt, U. Maurer, ”Trading Correctness for Privacy in Unconditional Multi-Party Compution”, Advances in Cryptology: Proceedings of Crypto’98, Lecture Notes in Computer Science 1462, Springer-Verlag, pp.121-136, 1998.
-
(1998)
Trading Correctness for Privacy in Unconditional Multi-Party Compution
, pp. 121-136
-
-
Fitzi, M.1
Hirt, M.2
Maurer, U.3
-
13
-
-
0028017207
-
Identity-Based Conference Key Broadcast Systems
-
T. Hwang, J.L. Chen, ”Identity-Based Conference Key Broadcast Systems”, IEE Computers and Digital Techniques, Vol. 141, No. 1, pp.57-60, 1994.
-
(1994)
IEE Computers and Digital Techniques
, vol.141
, Issue.1
, pp. 57-60
-
-
Hwang, T.1
Chen, J.L.2
-
14
-
-
0020180459
-
-
I. Ingemarsson, D.T. Tang, C.K. Wong, ”A Conference Key Distribution System”, IEEE Transactions on Information Theory, Vol. IT-28, No. 5, pp.714-720, 1982.
-
(1982)
IEEE Transactions on Information Theory, Vol. IT-28
, vol.5
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.T.2
Wong, C.K.3
-
15
-
-
0347265673
-
T. Beth, ”Conference Key Distribution Protocols in Distributed Systems”
-
B. Klein, M. Otten, T. Beth, ”Conference Key Distribution Protocols in Distributed Systems”, In Proceedings of Codes and Ciphers-Cryptography and Coding IV, IMA, pp.225-242, 1995.
-
(1995)
Proceedings of Codes and Ciphers-Cryptography and Coding IV
, pp. 225-242
-
-
Klein, B.1
Otten, M.2
-
16
-
-
84957796369
-
-
Advances in Cryptology: Proceedings of Eurocrypt’92, Lecture Notes in Computer Science 658, Springer-Verlag
-
K. Koyama, ”Secure Conference Key Distribution Schemes for Conspiracy Attack”, Advances in Cryptology: Proceedings of Eurocrypt’92, Lecture Notes in Computer Science 658, Springer-Verlag, pp.449-453, 1993.
-
(1993)
Secure Conference Key Distribution Schemes for Conspiracy Attack
, pp. 449-453
-
-
Koyama, K.1
-
17
-
-
84990736101
-
-
Advances in Cryptology: Proceedings of Crypto’87, Lecture Notes in Computer Science 293, Springer-Verlag
-
K. Koyama, K. Ohta, ”Identity-Based Conference Key Distribution Systems”, Advances in Cryptology: Proceedings of Crypto’87, Lecture Notes in Computer Science 293, Springer-Verlag, pp.175-184, 1988.
-
(1988)
Identity-Based Conference Key Distribution Systems
, pp. 175-184
-
-
Koyama, K.1
Ohta, K.2
-
18
-
-
84990740394
-
-
Advances in Cryptology: Proceedings of Eurocrypt’88, Lecture Notes in Computer Science 330, Springer-Verlag
-
K. Koyama, K. Ohta, ”Security of Improved Identity-Based Conference Key Distributioin Systems”, Advances in Cryptology: Proceedings of Eurocrypt’88, Lecture Notes in Computer Science 330, Springer-Verlag, pp.11-19, 1988.
-
(1988)
Security of Improved Identity-Based Conference Key Distributioin Systems
, pp. 11-19
-
-
Koyama, K.1
Ohta, K.2
-
19
-
-
84989455644
-
-
Advances in Cryptology: Proceedings of Crypto’87, Lecture Notes in Computer Science 293, Springer-Verlag
-
T. Matsumoto, H. Imai, ”On the Key Predistribution System: A Practical Solution to the Key Distribution Problem”, Advances in Cryptology: Proceedings of Crypto’87, Lecture Notes in Computer Science 293, Springer-Verlag, pp.185-193, 1988.
-
(1988)
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem
, pp. 185-193
-
-
Matsumoto, T.1
Imai, H.2
-
20
-
-
0002825551
-
Digital Signature
-
In Contempary Cryptography, IEEE Press
-
C.J. Mitchell, F. Piper, P. Wild, ”Digital Signature”, In Contempary Cryptography, The Science of Information Integrity, pp.325-378, IEEE Press, 1992.
-
(1992)
The Science of Information Integrity
, pp. 325-378
-
-
Mitchell, C.J.1
Piper, F.2
Wild, P.3
-
25
-
-
0018545449
-
How to share a secret
-
A. Shamir, ”How to share a secret”, Communications of the ACM, Vol. 22, pp.612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
26
-
-
84957810610
-
-
Advances in Cryptology: Proceedings of Asiacrypt’91, Lecture Notes in Computer Science 739, Springer-Verlag
-
A. Shimbo, S. I. Kawamura, ”Cryptanalysis of Several Conference Key Distribution Schemes”, Advances in Cryptology: Proceedings of Asiacrypt’91, Lecture Notes in Computer Science 739, Springer-Verlag, pp.265-276, 1993.
-
(1993)
Cryptanalysis of Several Conference Key Distribution Schemes
, pp. 265-276
-
-
Shimbo, A.1
Kawamura, S.I.2
-
27
-
-
84942550160
-
-
Advances in Cryptology: Proceedings of Eurocrypt’97, Lecture Notes in Computer Science 1233, Springer-Verlag
-
V. Shoup, ”Lower Bounds for Discrete Logarithms and Related Problems”, Advances in Cryptology: Proceedings of Eurocrypt’97, Lecture Notes in Computer Science 1233, Springer-Verlag, pp.256-266, 1997.
-
(1997)
Lower Bounds for Discrete Logarithms and Related Problems
, pp. 256-266
-
-
Shoup, V.1
-
28
-
-
84978523717
-
-
Advances in Cryptology: Proceedings of Crypto’88, Lecture Notes in Computer Science 409, Springer-Verlag
-
D.G. Steer, L. Strawczynski, W. Diffie, M. Wiener, ”A Secure Audio Teleconference System”, Advances in Cryptology: Proceedings of Crypto’88, Lecture Notes in Computer Science 409, Springer-Verlag, pp.520-528, 1990.
-
(1990)
A Secure Audio Teleconference System
, pp. 520-528
-
-
Steer, D.G.1
Strawczynski, L.2
Diffie, W.3
Wiener, M.4
-
29
-
-
0031098126
-
Conference Key Distribution System with User Anonymity Based on Algebraic Approach
-
T.C. Wu, ”Conference Key Distribution System with User Anonymity Based on Algebraic Approach”, Proceedings of IEE Computers and Digital Techniques, Vol. 144, No 2, pp.145-148, 1997.
-
(1997)
Proceedings of IEE Computers and Digital Techniques
, vol.144
, Issue.2
, pp. 145-148
-
-
Wu, T.C.1
-
30
-
-
84863285641
-
-
Advances in Cryptology: Proceedings of Crypto’87, Lecture Notes in Computer Science 293, Springer-Verlag
-
Y. Yacobi, ”Attack on the Koyama-Ohta Identity Based Key Distribution Scheme”, Advances in Cryptology: Proceedings of Crypto’87, Lecture Notes in Computer Science 293, Springer-Verlag, pp429-433, 1988.
-
(1988)
Attack on the Koyama-Ohta Identity Based Key Distribution Scheme
, pp. 429-433
-
-
Yacobi, Y.1
|