-
1
-
-
84956860375
-
Experimenting with electronic commerce on the PalmPilot
-
Springer-Verlag
-
D. Boneh and N. Daswani. “Experimenting with electronic commerce on the PalmPilot”, Proc. of Financial Cryptography‘99, LNCS, Vol. 1648, Springer-Verlag, pp. 1-16, 1999.
-
(1999)
Proc. Of Financial Cryptography‘99, LNCS
, vol.1648
, pp. 1-16
-
-
Boneh, D.1
Daswani, N.2
-
2
-
-
84958639277
-
Efficient generation of shared RSA keys
-
D. Boneh and M. Franklin, “Efficient generation of shared RSA keys”, Advances in Cryptology-CRYPTO‘97, LNCS 1294, pp. 425-439, 1997.
-
(1997)
Advances in Cryptology-CRYPTO‘97, LNCS
, vol.1294
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
0027961556
-
How to share a function securely (Extended summary)
-
Montréal, Québec, Canada, 23-25 May
-
A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung. “How to share a function securely (extended summary)”. In Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, pages 522-533, Montréal, Québec, Canada, 23-25 May 1994.
-
(1994)
Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing
, pp. 522-533
-
-
de Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
4
-
-
84985822377
-
Threshold cryptosystems
-
Y. Desmedt. “Threshold cryptosystems” (a survey). In Auscrypt’92, LNCS 718, pages 3-14.
-
Auscrypt’92, LNCS
, vol.718
, pp. 3-14
-
-
Desmedt, Y.1
-
5
-
-
85022187530
-
Shared generation of authenticators and signatures (Extended abstract)
-
Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures (extended abstract). In CRYPTO’91 CRYPTO91, pages 457-469.
-
CRYPTO’91 CRYPTO91
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
6
-
-
85023809951
-
Threshold cryptosystems
-
Y. Desmedt and Y. Frankel, “Threshold cryptosystems”, Advances in Cryptology-CRYPTO‘89, LNCS 435, pp. 307-315, 1989.
-
(1989)
Advances in Cryptology-CRYPTO‘89, LNCS
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
7
-
-
0031375570
-
Optimal-resilience proactive public-key cryptosystems
-
Y. Frankel, P. Gemmell, P. D. MacKenzie and M. Yung, “Optimal-resilience proactive public-key cryptosystems”, 38th Annual Symposium on Foundations of Computer Science, pp. 384-393, 1997.
-
(1997)
38th Annual Symposium on Foundations of Computer Science
, pp. 384-393
-
-
Frankel, Y.1
Gemmell, P.2
Mackenzie, P.D.3
Yung, M.4
-
8
-
-
0029713931
-
Witness-based cryptographic program checking and robust function sharing
-
Y. Frankel, P. Gemmell, and M. Yung. Witness-based cryptographic program checking and robust function sharing. In STOC’96, pages 499-508.
-
STOC’96
, pp. 499-508
-
-
Frankel, Y.1
Gemmell, P.2
Yung, M.3
-
9
-
-
0031628726
-
Robust efficient distributed, RSA-key generation
-
Y. Frankel, P. D. MacKenzie and M. Yung, “Robust efficient distributed, RSA-key generation”, Proceedings of the thirtieth annual ACM symposium on theory of computing, pp. 663-672, 1998.
-
(1998)
Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing
, pp. 663-672
-
-
Frankel, Y.1
Mackenzie, P.D.2
Yung, M.3
-
10
-
-
84958795917
-
Pseudorandom Intermixing”: A Tool for Shared Cryptography
-
January 18-20, Melbourne, Australia
-
Y. Frankel, P. D. MacKenzie and M. Yung, “Pseudorandom Intermixing”: A Tool for Shared Cryptography”, To appear in Proc. of PKC’2000, International Workshop on Practice and Theory in Public Key Cryptography, January 18-20, 2000, Melbourne, Australia.
-
(2000)
Proc. Of PKC’2000, International Workshop on Practice and Theory in Public Key Cryptography
-
-
Frankel, Y.1
Mackenzie, P.D.2
Yung, M.3
-
11
-
-
22044454382
-
Distributed public key cryptosystems
-
Y. Frankel and M. Yung, “Distributed public key cryptosystems”, (Invited Paper) Public Key Cryptography, LNCS 1431, pp. 1-13, 1998.
-
(1998)
Public Key Cryptography, LNCS
, vol.1431
, pp. 1-13
-
-
Frankel, Y.1
Yung, M.2
-
12
-
-
84947441722
-
“Robust and efficient sharing of RSA functions
-
Springer-Verlag, 18-22 Aug
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. “Robust and efficient sharing of RSA functions”. In Advances in Cryptology—CRYPTO‘96, volume 1109 of Lecture Notes in Computer Science, pages 157-172. Springer-Verlag, 18-22 Aug. 1996.
-
(1996)
Advances in Cryptology—CRYPTO‘96, Volume 1109 of Lecture Notes in Computer Science
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
14
-
-
52049125368
-
Threshold key-recovery systems for RSA
-
T. Okamoto, “Threshold key-recovery systems for RSA”, Security Protocols, LNCS 1361, pp. 191-200, 1997.
-
(1997)
Security Protocols, LNCS
, vol.1361
, pp. 191-200
-
-
Okamoto, T.1
-
15
-
-
84876222959
-
Distributed provers with applications to undeniable signatures
-
T. P. Pedersen, “Distributed provers with applications to undeniable signatures”, Advances in Cryptology-Eurocrypt‘91, LNCS 547, pp. 221-238, 1991.
-
(1991)
Advances in Cryptology-Eurocrypt‘91, LNCS
, vol.547
, pp. 221-238
-
-
Pedersen, T.P.1
-
16
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
T. P. Pedersen, “A threshold cryptosystem without a trusted party”, Advances in Cryptology-Eurocrypt‘91, LNCS 547, pp. 522-526, 1991.
-
(1991)
Advances in Cryptology-Eurocrypt‘91, LNCS
, vol.547
, pp. 522-526
-
-
Pedersen, T.P.1
-
17
-
-
84957689308
-
A simplified approach to threshold and proactive rsa
-
T. Rabin. A simplified approach to threshold and proactive rsa. In Krawczyk CRYPTO98, pages 89-104.
-
Krawczyk CRYPTO98
, pp. 89-104
-
-
Rabin, T.1
-
18
-
-
0018545449
-
How to share a secret
-
A. Shamir, “How to share a secret”, Communication ACM, 22, pp. 612-613, 1979.
-
(1979)
Communication ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
19
-
-
0001000209
-
-
June 24, A revision of IBM Research Report RZ 3121 (April 19, 1999) available from Theory of Cryptography Library 99-11
-
V. Shoup, “Practical threshold signatures”, June 24, 1999, A revision of IBM Research Report RZ 3121 (April 19, 1999) available from Theory of Cryptography Library 99-11, http://philby.ucsd.edu/cryptolib/1999.html.
-
(1999)
Practical Threshold Signatures
-
-
Shoup, V.1
-
20
-
-
0343349510
-
A’weak’ privacy protocol using the RSA cryptoalgorithm
-
G. J. Simmons, “A’weak’ privacy protocol using the RSA cryptoalgorithm”, Cryptologia, vol. 7, pp. 180-182, 1983.
-
(1983)
Cryptologia
, vol.7
, pp. 180-182
-
-
Simmons, G.J.1
|