-
2
-
-
4243132035
-
-
Ph.D. thesis, Harvard University, May
-
D. Beaver, "Security, fault tolerance, and communication complexity in distributed systems," Ph.D. thesis, Harvard University, May 1990.
-
(1990)
Security, Fault Tolerance, and Communication Complexity in Distributed Systems
-
-
Beaver, D.1
-
4
-
-
0010224921
-
"Secret sharing homomorphisms: Keeping shares of a secret secret
-
J. Benaloh (Cohen), "Secret sharing homomorphisms: keeping shares of a secret secret," Crypto '86, 251-260.
-
Crypto
, vol.86
, pp. 251-260
-
-
Benaloh, J.1
-
5
-
-
0018456171
-
Universal classes of hash functions
-
J. Carter and M. Wegman, "Universal classes of hash functions", J. Comput. Syst. Set. 18 (1979), 143-154.
-
(1979)
J. Comput. Syst. Set.
, vol.18
, pp. 143-154
-
-
Carter, J.1
Wegman, M.2
-
6
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crepeau, and I. Damgird, "Multiparty unconditionally secure protocols," ACM STOC 1988, 11-19.
-
(1988)
ACM STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgird, I.3
-
7
-
-
0007414099
-
On the numbei of uncanceled elements in the sieve of Eratosthenes
-
Reviewed in LeVeque Reviews in Number Theory, Vol. 4, Section N-28, p. 221
-
N. De Biuijn, "On the numbei of uncanceled elements in the sieve of Eratosthenes", Proc. Neder. Akad. Wetensch, vol. 53, 1950, pp. 803-812. Reviewed in LeVeque Reviews in Number Theory, Vol. 4, Section N-28, p. 221.
-
(1950)
Proc. Neder. Akad. Wetensch
, vol.53
, pp. 803-812
-
-
De Biuijn, N.1
-
8
-
-
0027961556
-
-
STOC
-
A. DeSantis, Y. Desmedt, Y. Frankel, M. Yung, "How to share a function securely", STOC 1994, pp. 522-533.
-
(1994)
How to Share a Function Securely
, pp. 522-533
-
-
Desantis, A.1
Desmedt, Y.2
Frankel Yung, Y.M.3
-
9
-
-
0028462933
-
Threshold cryptography
-
July-August
-
Y. Desmedt, "Threshold cryptography," European Transactions on Telecommunications and Related Technologies, Vol. 5, No. 4, July-August 1994, pp. 35-43.
-
(1994)
European Transactions on Telecommunications and Related Technologies
, vol.5
, Issue.4
, pp. 35-43
-
-
Desmedt, Y.1
-
10
-
-
85022187530
-
Shared generation of authenticators and signatures
-
Y. Desmedt and Y. Frankel, "Shared generation of authenticators and signatures", Crypto '91, 457-469.
-
Crypto
, vol.91
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
11
-
-
0024135240
-
Zero-knowledge proofs of identity
-
U. Feige, A. Fiat, and A. Shamir, "Zero-knowledge proofs of identity," Journal of Cryptology 1 (1988), 77-94.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
12
-
-
84990731886
-
"How to prove yourself: Practical solutions to identification and signature problems
-
A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems," Crypto '86, 186-194.
-
Crypto
, vol.86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
13
-
-
0039241746
-
A practical protocol for large group oriented networks
-
Y. Frankel, "A practical protocol for large group oriented networks", Eurocrypt 89, pp. 56-61.
-
Eurocrypt
, vol.89
, pp. 56-61
-
-
Frankel, Y.1
-
14
-
-
0002992068
-
Joint encryption and message-efficient secure computation
-
M. Franklin and S. Haber, "Joint encryption and message-efficient secure computation," Journal of Cryptology, 9 (1996), 217-232.
-
(1996)
Journal of Cryptology
, vol.9
, pp. 217-232
-
-
Franklin, M.1
Haber, S.2
-
15
-
-
0030150177
-
Comparing information without leaking it
-
R. Fagin, M. Naor, P. Winkler, "Comparing information without leaking it", CACM, Vol 39, No. 5, May 1996, pp. 77-85.
-
(1996)
CACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
16
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, "Robust and efficient sharing of RSA functions", Crypto 96, pp. 157-172.
-
Crypto
, vol.96
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
18
-
-
84969342159
-
Strong primes are easy to find
-
J. Gordon, "Strong primes are easy to find", Eurocrypt 84, pp. 216-223
-
Eurocrypt
, vol.84
, pp. 216-223
-
-
Gordon, J.1
-
19
-
-
0001654317
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
L. Guillou and J. Quisquater, "A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory," Eurocrypt '88, 123-128.
-
Eurocrypt
, vol.88
, pp. 123-128
-
-
Guillou, L.1
Quisquater, J.2
-
20
-
-
0004794571
-
A modification of the Fiat-Shamir scheme
-
K. Ohta and T. Okamoto, "A modification of the Fiat-Shamir scheme," Crpto '88, 232-243.
-
Crpto
, vol.88
, pp. 232-243
-
-
Ohta, K.1
Okamoto, T.2
-
21
-
-
0004743525
-
Fast signature generation with a Fiat Shamir-like scheme
-
H. Ong and C. Schnorr, "Fast signature generation with a Fiat Shamir-like scheme," Eurocrypt '90, 432-440.
-
Eurocrypt
, vol.90
, pp. 432-440
-
-
Ong, H.1
Schnorr, C.2
-
22
-
-
0000135789
-
A threshold cryptosystem without a trusted party
-
T. Pederson, "A threshold cryptosystem without a trusted party," Proceedings of Eurocrypt 91, pp. 522-526.
-
Proceedings of Eurocrypt
, vol.91
, pp. 522-526
-
-
Pederson, T.1
-
23
-
-
33845432604
-
Probabilistic algorithm for testing primality
-
M. Rabin, "Probabilistic algorithm for testing primality", J. of Number Theory, vol. 12, pp. 128-138, 1980.
-
(1980)
J. Of Number Theory
, vol.12
, pp. 128-138
-
-
Rabin, M.1
-
24
-
-
0001873077
-
A fast monte carlo test for primality
-
R. Solovay, V. Strassen, "A fast monte carlo test for primality", SIAM journal of computing, vol. 6, pp. 84-85, 1977.
-
(1977)
SIAM Journal of Computing
, vol.6
, pp. 84-85
-
-
Solovay, R.1
Strassen, V.2
-
25
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. Wegman and J. Carter, "New hash functions and their use in authentication and set equality", J. Comput. Syst. Sci. 22 (1981), 265-279.
-
(1981)
J. Comput. Syst. Sci.
, vol.22
, pp. 265-279
-
-
Wegman, M.1
Carter, J.2
-
26
-
-
0022882770
-
How to generate and exchange secrets
-
A. Yao, "How to generate and exchange secrets", FOCS 1986, pp. 162-167.
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.1
|