-
1
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes,”
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Relations among notions of security for public-key encryption schemes,” CRYPTO’98, LNCS 1462, (1998), pp.26-45.
-
(1998)
CRYPTO’98, LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
2
-
-
84945139265
-
The bit security of Pailliers encryption scheme and its applications,”
-
D. Catalano, R. Gennaro, and N. Howgraw-Graham; “The bit security of Paillier’s encryption scheme and its applications,” Eurocrypt 2001, LNCS 2045, pp.229-243, 2001.
-
(2001)
Eurocrypt 2001, LNCS
, vol.2045
, pp. 229-243
-
-
Catalano, D.1
Gennaro, R.2
Howgraw-Graham, N.3
-
3
-
-
0035751083
-
-
D. Catalano, R. Gennaro, N. Howgrave-Graham, and P. Nguyen; “Paillier’s cryptosystem revisited,” to appear in the ACM conference on Computer and Communication Security, 2001.
-
(2001)
Pailliers Cryptosystem revisited,” to Appear in the ACM Conference on Computer and Communication Security
-
-
Catalano, D.1
Gennaro, R.2
Howgrave-Graham, N.3
Nguyen, P.4
-
4
-
-
84947924912
-
Finding a small root of a univariate modular equation
-
D. Coppersmith, “Finding a small root of a univariate modular equation,” EUROCRYPT’96, LNCS 1070, pp.155–165, 1996.
-
(1996)
EUROCRYPT’96, LNCS
, vol.1070
, pp. 155-165
-
-
Coppersmith, D.1
-
5
-
-
84947902524
-
Low-exponent RSA with related messages
-
D. Coppersmith, M. Franklin, J. Patarin, M. Reiter, “Low-exponent RSA with related messages,” EUROCRYPT’96, LNCS 1070, (1996), pp.1-9.
-
(1996)
EUROCRYPT’96, LNCS
, vol.1070
, pp. 1-9
-
-
Coppersmith, D.1
Franklin, M.2
Patarin, J.3
Reiter, M.4
-
6
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup, “A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack,” CRYPTO’98, LNCS 1462, pp.13-25, 1998.
-
(1998)
CRYPTO’98, LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
7
-
-
35248883505
-
“Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-Key encryption
-
R. Cramer and V. Shoup, “Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-Key encryption,” Cryptology ePrint Archive, IACR, http://eprint.iacr.org/, 2001.
-
(2001)
Cryptology Eprint Archive, IACR
-
-
Cramer, R.1
Shoup, V.2
-
8
-
-
84867553981
-
A generalization, a simplification and some applications of Pailliers probabilistic public-Key system,”
-
I. Damgård and M. Jurik; “A generalization, a simplification and some applications of Paillier’s probabilistic public-Key system,” PKC 2001, LNCS 1992, pp.119-136, 2001.
-
(2001)
PKC 2001, LNCS
, vol.1992
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
9
-
-
0011189534
-
Stronger security proofs for RSA and Rabin bits
-
R. Fischlin and C.P. Schnorr; “Stronger security proofs for RSA and Rabin bits,” Journal of Cryptology, 13 (2), pp.221-244, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.2
, pp. 221-244
-
-
Fischlin, R.1
Schnorr, C.P.2
-
10
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali; “Probabilistic encryption,” Journal of Computer and System Science, Vol.28, No.2, pp.270-299, 1984.
-
(1984)
Journal of Computer and System Science
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
11
-
-
0346386524
-
Efficient, perfect random number generators
-
S. Micali and C. Schnorr, “Efficient, perfect random number generators,” Crypto’88, LNCS 403, pp.173-199, 1988.
-
(1988)
Crypto’88, LNCS
, vol.403
, pp. 173-199
-
-
Micali, S.1
Schnorr, C.2
-
12
-
-
0025207738
-
A fast signature scheme based on congruential polynomial operations,”
-
T. Okamoto; “A fast signature scheme based on congruential polynomial operations,” IEEE Transactions on Information Theory, IT-36, pp.47-53, 1990.
-
(1990)
IEEE Transactions on Information Theory, IT-36
, pp. 47-53
-
-
Okamoto, T.1
-
13
-
-
84937389342
-
The Gap-Problems: A new class of problems for the security of cryptographic schemes
-
T. Okamoto and D. Pointcheval, “The Gap-Problems: a new class of problems for the security of cryptographic schemes,” PKC 2001, LNCS 1992, pp.104-118, 2001.
-
(2001)
PKC 2001, LNCS
, vol.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
14
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
T. Okamoto and S. Uchiyama; “A new public-key cryptosystem as secure as factoring,” Eurocrypt’98, LNCS 1403, pp.308-318, 1998.
-
(1998)
Eurocrypt’98, LNCS
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
15
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier; “Public-key cryptosystems based on composite degree residuosity classes,” Eurocrypt’99, LNCS 1592, pp.223-238, 1999.
-
(1999)
Eurocrypt’99, LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
16
-
-
84957652328
-
New public key cryptosystems based on the dependent-RSA problems
-
D. Pointcheval, “New public key cryptosystems based on the dependent-RSA problems,” Eurocryt’99, LNCS 1592, pp. 239-254, 1999.
-
(1999)
Eurocryt’99, LNCS
, vol.1592
, pp. 239-254
-
-
Pointcheval, D.1
-
17
-
-
84958680532
-
Fast RSA-type cryptosystems using n-adic expansion
-
T. Takagi, “Fast RSA-type cryptosystems using n-adic expansion,” CRYPTO’97, LNCS 1294, pp.372-384, 1997.
-
(1997)
CRYPTO’97, LNCS
, vol.1294
, pp. 372-384
-
-
Takagi, T.1
|