-
1
-
-
84956967868
-
A New Forward-Secure Digital Signature Scheme
-
M. Abdalla and L. Reyzin. A New Forward-Secure Digital Signature Scheme. Asiacrypt 2000.
-
Asiacrypt 2000
-
-
Abdalla, M.1
Reyzin, L.2
-
2
-
-
33845949171
-
Two Remarks on Public-Key Cryptology
-
Invited lecture
-
R. Anderson. Two Remarks on Public-Key Cryptology. Invited lecture, CCCS 1997. URL: http://www.cl.cam.ac.uk/users/rja14/.
-
CCCS 1997
-
-
Anderson, R.1
-
3
-
-
0001229355
-
A Forward-Secure Digital Signature Scheme
-
M. Bellare and S. Miner. A Forward-Secure Digital Signature Scheme. Crypto 1999.
-
Crypto 1999
-
-
Bellare, M.1
Miner, S.2
-
6
-
-
0012970453
-
Identity-Based Encryption from the Weil Pairing
-
Crypto 2001
-
D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. Crypto 2001. Full version to appear in SIAM J. Computing and available at http://eprint.iacr.org/2001/090/.
-
SIAM J. Computing
-
-
Boneh, D.1
Franklin, M.2
-
14
-
-
84962734623
-
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
-
Y. Dodis, A. Sahai and A. Smith. On Perfect and Adaptive Security in Exposure-Resilient Cryptography. EuroCrypt 2001.
-
EuroCrypt 2001
-
-
Dodis, Y.1
Sahai, A.2
Smith, A.3
-
15
-
-
0000561923
-
Secure Integration of Asymmetric and Symmetric Encryption Schemes
-
E. Fujisaki and T. Okamoto. Secure Integration of Asymmetric and Symmetric Encryption Schemes. Crypto 1999.
-
Crypto 1999
-
-
Fujisaki, E.1
Okamoto, T.2
-
18
-
-
14844282616
-
Toward Hierarchical Identity-Based Encryption
-
J. Horwitz and B. Lynn. Toward Hierarchical Identity-Based Encryption. Eurocrypt 2002.
-
Eurocrypt 2002
-
-
Horwitz, J.1
Lynn, B.2
-
19
-
-
70549087421
-
Intrusion-Resilient Signatures: Generic Constructions, or Defeating a Strong Adversary with Minimal Assumptions
-
G. Itkis. Intrusion-Resilient Signatures: Generic Constructions, or Defeating a Strong Adversary with Minimal Assumptions. SCN 2002.
-
SCN 2002
-
-
Itkis, G.1
-
20
-
-
0037885445
-
Forward-Secure Signatures with Optimal Signing and Verifying
-
G. Itkis and L. Reyzin. Forward-Secure Signatures with Optimal Signing and Verifying. Crypto 2001.
-
Crypto 2001
-
-
Itkis, G.1
Reyzin, L.2
-
21
-
-
84871980827
-
SiBIR: Signer-Base Intrusion-Resilient Signatures
-
G. Itkis and L. Reyzin. SiBIR: Signer-Base Intrusion-Resilient Signatures. Crypto 2002.
-
Crypto 2002
-
-
Itkis, G.1
Reyzin, L.2
-
22
-
-
0038425885
-
The Weil and Tate Pairing as Building Blocks for Public-Key Cryptosystems
-
A. Joux. The Weil and Tate Pairing as Building Blocks for Public-Key Cryptosystems. ANTS 2002.
-
ANTS 2002
-
-
Joux, A.1
-
24
-
-
0034450093
-
Simple Forward-Secure Signatures From any Signature Scheme
-
H. Krawczyk. Simple Forward-Secure Signatures From any Signature Scheme. CCCS 2000.
-
CCCS 2000
-
-
Krawczyk, H.1
-
26
-
-
84956984016
-
Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods
-
T. Malkin, D. Micciancio, and S. Miner. Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods. Eurocrypt 2002.
-
Eurocrypt 2002
-
-
Malkin, T.1
Micciancio, D.2
Miner, S.3
-
27
-
-
85027164480
-
How to Withstand Mobile Virus Attacks
-
R. Ostrovsky and M. Yung. How to Withstand Mobile Virus Attacks. PODC 1991.
-
PODC 1991
-
-
Ostrovsky, R.1
Yung, M.2
-
28
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. In Communic. of the ACM, 22:612-613, 1979.
-
(1979)
Communic. of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
29
-
-
0001827537
-
Identity-Based Cryptosystems and Signature Schemes
-
A. Shamir. Identity-Based Cryptosystems and Signature Schemes. Crypto 1984.
-
Crypto 1984
-
-
Shamir, A.1
|