-
1
-
-
0003030602
-
Coin flipping by telephone — a protocol for solving impossible problems
-
IEEE Computer Society, February
-
M. Blum. Coin flipping by telephone — a protocol for solving impossible problems. In digest of papers COMPCON82, pp. 133-137. IEEE Computer Society, February 1982.
-
(1982)
Digest of Papers COMPCON82
, pp. 133-137
-
-
Blum, M.1
-
2
-
-
0012494996
-
Convertible undeniable signatures
-
August 12-15, Santa Barbara, California, U.S.A., to appear in: Advances in Cryptology. Proc. of Crypto '90 (Lecture Notes in Computer Science), Springer-Verlag, 1990
-
J. Boyar, D. Chaum, I. Damgard, and T. Pedersen. Convertible undeniable signatures. Presented at Crypto ’90, August 12-15, 1990, Santa Barbara, California, U.S.A., to appear in: Advances in Cryptology. Proc. of Crypto '90 (Lecture Notes in Computer Science), Springer-Verlag, 1990.
-
(1990)
Presented at Crypto ’90
-
-
Boyar, J.1
Chaum, D.2
Damgard, I.3
Pedersen, T.4
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24 (2), pp. 84-88, February 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
4
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology, 1 (1), pp. 65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
5
-
-
85030451201
-
On weaknesses of ‘weaknesses of undeniable signatures'
-
Brighton, U.K., April (Communicated to us by Gus Simmons.)
-
D. Chaum. On weaknesses of ‘weaknesses of undeniable signatures'. Presented at the rump session of Eurocrypt ’91, Brighton, U.K., April (Communicated to us by Gus Simmons.) 1991.
-
(1991)
Presented at the Rump Session of Eurocrypt ’91
-
-
Chaum, D.1
-
7
-
-
85043778396
-
Zero-knowledge undeniable signatures
-
In I. Damgård, editor, Springer-Verlag, Aarhus, Denmark, May 21-24
-
D. Chaum. Zero-knowledge undeniable signatures. In I. Damgård, editor, Advances in Cryptology, Proc. of Eurocrypt’90 (Lecture Notes in Computer Science 473), pp. 458-464. Springer-Verlag, 1991. Aarhus, Denmark, May 21-24.
-
(1991)
Advances in Cryptology, Proc. of Eurocrypt’90 (Lecture Notes in Computer Science 473)
, pp. 458-464
-
-
Chaum, D.1
-
8
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
May 2-4
-
D. Chaum, C. Crepeau, and I. Damgard. Multiparty unconditionally secure protocols. In Proceedings of the twentieth annual ACM Symp. Theory of Computing, STOC, pp. 11-19, May 2-4, 1988.
-
(1988)
Proceedings of the Twentieth Annual ACM Symp. Theory of Computing, STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
9
-
-
84864708144
-
Multiparty computations ensuring privacy of each party’s input and correctness of the result
-
In C. Pomerance, editor, Springer-Verlag, 1988. Santa Barbara, Ca., August 16-20
-
D. Chaum, I. Damgard, and J. van de Graaf. Multiparty computations ensuring privacy of each party’s input and correctness of the result. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto’87 (Lecture Notes in Computer Science 293), pp. 87-119. Springer-Verlag, 1988. Santa Barbara, Ca., August 16-20, 1987.
-
(1987)
Advances in Cryptology, Proc. of Crypto’87 (Lecture Notes in Computer Science 293)
, pp. 87-119
-
-
Chaum, D.1
Damgard, I.2
Van De Graaf, J.3
-
10
-
-
0010252194
-
Undeniable signatures
-
In G. Brassard, editor, Springer-Verlag, Santa Barbara, California, U.S.A., August 20-24
-
D. Chaum and H. van Antwerpen. Undeniable signatures. In G. Brassard, editor, Advances in Cryptology—Crypto’89, Proceedings (Lecture Notes in Computer Science 435), pp. 212-216. Springer-Verlag, 1990. Santa Barbara, California, U.S.A., August 20-24.
-
(1990)
Advances in Cryptology—Crypto’89, Proceedings (Lecture Notes in Computer Science 435)
, pp. 212-216
-
-
Chaum, D.1
Van Antwerpen, H.2
-
11
-
-
0010276082
-
Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem
-
University of Wisconsin-Milwaukee, October
-
G. I. Davida. Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem. Tech. Report TR-CS-82-2, University of Wisconsin-Milwaukee, October 1982.
-
(1982)
Tech. Report TR-CS-82-2
-
-
Davida, G.I.1
-
12
-
-
84946861053
-
Attacks on some RSA signatures
-
Springer-Verlag, New York, 1986. Santa Barbara, California, U.S.A., August 18-22
-
W. de Jonge and D. Chaum. Attacks on some RSA signatures. In Advances in Cryptology: Crypto’85, Proceedings (Lecture Notes in Computer Science 218), pp. 18-27. Springer-Verlag, New York, 1986. Santa Barbara, California, U.S.A., August 18-22, 1985.
-
(1985)
Advances in Cryptology: Crypto’85, Proceedings (Lecture Notes in Computer Science 218)
, pp. 18-27
-
-
De Jonge, W.1
Chaum, D.2
-
13
-
-
85012584879
-
Some variations on RSA signatures & their security
-
In A. Odlyzko, editor, Springer-Verlag, Santa Barbara, California, U. S. A., August 11-15
-
W. de Jonge and D. Chaum. Some variations on RSA signatures & their security. In A. Odlyzko, editor, Advances in Cryptology, Proc. of Crypto’86 (Lecture Notes in Computer Science 263), pp. 49-59. Springer-Verlag, 1987. Santa Barbara, California, U. S. A., August 11-15.
-
(1987)
Advances in Cryptology, Proc. of Crypto’86 (Lecture Notes in Computer Science 263)
, pp. 49-59
-
-
De Jonge, W.1
Chaum, D.2
-
15
-
-
84976740532
-
Digital signatures with RSA and other public-key cryptosystems
-
D. E. R. Denning. Digital signatures with RSA and other public-key cryptosystems. Comm. ACM 27, pp. 388-392, 1984.
-
(1984)
Comm. ACM
, vol.27
, pp. 388-392
-
-
Denning, D.E.R.1
-
16
-
-
85028745474
-
Special uses and abuses of the Fiat-Shamir passport protocol
-
In C. Pomerance, editor, Springer-Verlag, Santa Barbara, California, U.S.A., August 16-20
-
Y. Desmedt, C. Goutier, and S. Bengio. Special uses and abuses of the Fiat-Shamir passport protocol. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto’87 (Lecture Notes in Computer Science 293), pp. 21-39. Springer-Verlag, 1988. Santa Barbara, California, U.S.A., August 16-20.
-
(1988)
Advances in Cryptology, Proc. of Crypto’87 (Lecture Notes in Computer Science 293)
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, C.2
Bengio, S.3
-
17
-
-
85030458019
-
A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes
-
In Hugh C. Williams, editor, Springer-Verlag, Santa Barbara, California, U.S.A., August 18-20
-
Y. Desmedt and A. Odlyzko. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes. In Hugh C. Williams, editor, Advances in Cryptology: Crypto’85, Proceedings (Lecture Notes in Computer Science 218), pp. 516-522. Springer-Verlag, 1986. Santa Barbara, California, U.S.A., August 18-20.
-
Advances in Cryptology: Crypto’85, Proceedings (Lecture Notes in Computer Science 218)
-
-
Desmedt, Y.1
Odlyzko, A.2
-
18
-
-
0020720357
-
On the security of public key cryptography
-
March
-
O. Dolev and A. Yao. On the security of public key cryptography. IEEE Trans. Inform. Theory, 29, pp. 198-208, March 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, pp. 198-208
-
-
Dolev, O.1
Yao, A.2
-
19
-
-
84976655650
-
Cryptographic computations: Secure fault-tolerant protocols and the public-key model
-
In C. Pomerance, editor, Springer-Verlag, 1988. Santa Barbara, Ca., August 16-20
-
Z. Galil, S. Haber, and M. Yung. Cryptographic computations: secure fault-tolerant protocols and the public-key model In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto’87 (Lecture Notes in Computer Science 293), pp. 135-155. Springer-Verlag, 1988. Santa Barbara, Ca., August 16-20, 1987.
-
(1987)
Advances in Cryptology, Proc. of Crypto’87 (Lecture Notes in Computer Science
, vol.293
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
20
-
-
0023545076
-
How to play any mental game
-
Theory of Computinq, STOC, May 25-27
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proceedings of the Nineteenth annual ACM Symp. Theory of Computinq, STOC, pp. 218-229, May 25-27, 1987.
-
(1987)
Proceedings of the Nineteenth Annual ACM Symp
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
0024014116
-
Protocol failures in cryptosystems
-
May
-
J. H. Moore. Protocol failures in cryptosystems. Proc. IEEE, 76(5), pp. 594-602, May 1988.
-
(1988)
Proc. IEEE
, vol.76
, Issue.5
, pp. 594-602
-
-
Moore, J.H.1
-
23
-
-
85032864442
-
Divertible zero knowledge interactive proofs and commutative random self-reducibility
-
In J.-J. Quisquater and J. Vande-walle, editors, Springer-Verlag, Houthalen, Belgium, April 10-13
-
T. Okamoto and K. Ohta. Divertible zero knowledge interactive proofs and commutative random self-reducibility. In J.-J. Quisquater and J. Vande-walle, editors, Advances in Cryptology, Proc. of Eurocrypt’89 (Lecture Notes in Computer Science 434), PP. 134-149. Springer-Verlag, 1990. Houthalen, Belgium, April 10-13.
-
(1990)
Advances in Cryptology, Proc. of Eurocrypt’89 (Lecture Notes in Computer Science 434)
, pp. 134-149
-
-
Okamoto, T.1
Ohta, K.2
|