-
1
-
-
0000867507
-
Minimum Disclosure Proofs of Knowledge
-
Brassard, G., Chaum, D., and Crépeau, C.: Minimum Disclosure Proofs of Knowledge. J. Computer and System Sciences, 37 (1988) 156–189
-
(1988)
J. Computer and System Sciences
, vol.37
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crépeau, C.3
-
2
-
-
84958769452
-
Convertible Undeniable Signatures
-
LNCS 537, Springer-Verlag
-
Boyar, J., Chaum, D., Damgård, I., Pedersen, T.: Convertible Undeniable Signatures. Proc. of Crypto’90, LNCS 537, Springer-Verlag, (1991) 189–205
-
(1991)
Proc. of Crypto’90
, pp. 189-205
-
-
Boyar, J.1
Chaum, D.2
Damgård, I.3
Pedersen, T.4
-
3
-
-
85043778396
-
Zero-Knowledge Undeniable Signatures
-
Springer-Verlag
-
Chaum, D.: Zero-Knowledge Undeniable Signatures. Proc. of Eurocrypto’90, LNCS 473, Springer-Verlag, (1991) 458–464
-
(1991)
Proc. of Eurocrypto’90, LNCS 473
, pp. 458-464
-
-
Chaum, D.1
-
4
-
-
0002083808
-
Designated Confirmer Signatures
-
Springer-Verlag (to appear)
-
Chaum, D.: Designated Confirmer Signatures. Proc. of Eurocrypt’ 94, LNCS, Springer-Verlag (to appear)
-
Proc. of Eurocrypt’ 94, LNCS
-
-
Chaum, D.1
-
5
-
-
0010252194
-
Undeniable Signatures. Proc. of Crypto’89, LNCS 435
-
Chaum, D., van Antwerpen, H.: Undeniable Signatures. Proc. of Crypto’89, LNCS 435, Springer-Verlag, (1990) 212–216
-
(1990)
Springer-Verlag
, pp. 212-216
-
-
Chaum, D.1
Van Antwerpen, H.2
-
6
-
-
0017018484
-
New Directions in Cryptography
-
Diffie, W., Hellman, M. E.: New Directions in Cryptography. IEEE Trans. Information Theory, 22,6, (1976) 644–654
-
(1976)
IEEE Trans. Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
7
-
-
84874800178
-
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
ElGamal, T.: A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans. Information Theory, 31,4, (1985) 460–472
-
(1985)
IEEE Trans. Information Theory
, vol.31
, Issue.4
, pp. 460-472
-
-
Elgamal, T.1
-
8
-
-
0024135240
-
Zero-Knowledge Proofs of Identity
-
Feige, U., Fiat, A., Shamir, A.: Zero-Knowledge Proofs of Identity. J. of Cryptology, 1,2 (1988) 77–94
-
(1988)
J. of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
9
-
-
0022793132
-
How to Construct Random Functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to Construct Random Functions. J. of ACM, 33,4 (1984) 792–807
-
(1984)
J. of ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
10
-
-
0024868772
-
A Hard-Core Predicate for any One-way Function
-
Goldreich, O., Levin, L.: A Hard-Core Predicate for any One-way Function. Proc. of STOC’89 (1989) 25–32
-
(1989)
Proc. of STOC’89
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.2
-
11
-
-
0021409284
-
Probabilistic Encryption
-
Goldwasser, S., Micali, S.: Probabilistic Encryption. J. Computer and System Sciences, 28,2 (1984) 270–299
-
(1984)
J. Computer and System Sciences
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
12
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof Systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The Knowledge Complexity of Interactive Proof Systems. SIAM J. Comput., 18,1 (1989) 186–208
-
(1989)
SIAM J. Comput
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
13
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
Goldwasser, S., Micali, S., Rivest, R.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput., 17,2 (1988) 281–308
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
14
-
-
0022914590
-
Proofs that Yield Nothing But their Validity and a Methodology of Cryptographic Protocol Design
-
Goldreich, O., Micali, S., Wigderson, A.: Proofs that Yield Nothing But their Validity and a Methodology of Cryptographic Protocol Design. Proc. FOCS (1986) 174–187
-
(1986)
Proc. FOCS
, pp. 174-187
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
15
-
-
84959165880
-
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory
-
Springer-Verlag
-
Guillou, L. C., Quisquater, J.J.: A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. Proc. of Eurocrypt’88, LNCS 330, Springer-Verlag (1988) 123–128
-
(1988)
Proc. of Eurocrypt’88, LNCS 330
, pp. 123-128
-
-
Guillou, L.C.1
Quisquater, J.J.2
-
16
-
-
0025115363
-
Pseudo-Random Generators under Uniform Assumptions
-
Håstad, J.: Pseudo-Random Generators under Uniform Assumptions. Proc. of STOC (1990) 395–404
-
(1990)
Proc. of STOC
, pp. 395-404
-
-
Håstad, J.1
-
17
-
-
0024866111
-
Pseudo-Random Number Generation from One-Way Functions
-
Impagliazzo, R., Levin, L., Luby, L.: Pseudo-Random Number Generation from One-Way Functions. Proc. of STOC (1989) 12–24
-
(1989)
Proc. of STOC
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.2
Luby, L.3
-
18
-
-
0024866742
-
Limits on the Provable Consequence of One-Way Permutations
-
Impagliazzo, R., Rudich, S.: Limits on the Provable Consequence of One-Way Permutations. Proc. of STOC (1989) 44–61
-
(1989)
Proc. of STOC
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
19
-
-
85028775577
-
Direct Minimum-Knowledge Computations
-
Springer-Verlag
-
Impagliazzo, R., Yung, M.: Direct Minimum-Knowledge Computations. Proc. of Crypto’87, LNCS 293, Springer-Verlag (1988) 40–51
-
(1988)
Proc. of Crypto’87, LNCS 293
, pp. 40-51
-
-
Impagliazzo, R.1
Yung, M.2
-
20
-
-
0023985474
-
The Notion of Security of Probabilistic Cryptosystems
-
Micali, S., Rackoff, C., Sloan, B.: The Notion of Security of Probabilistic Cryptosystems. SIAM J. Comput., 17,2 (1988) 412–426
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 412-426
-
-
Micali, S.1
Rackoff, C.2
Sloan, B.3
-
21
-
-
79551478054
-
Bit Commitment Using Pseudo-Randomness
-
Springer-Verlag
-
Naor, M.: Bit Commitment Using Pseudo-Randomness. Proc. of Crypto’89, LNCS 435, Springer-Verlag, (1990) 128–136
-
(1990)
Proc. of Crypto’89, LNCS 435
, pp. 128-136
-
-
Naor, M.1
-
22
-
-
0024867751
-
Universal One-Way Hash Functions and Their Cryptographic Applications
-
Naor, M., Yung, M.: Universal One-Way Hash Functions and Their Cryptographic Applications. Proc. of STOC (1989) 33–43
-
(1989)
Proc. of STOC
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
23
-
-
85031804925
-
A Modification of the Fiat-Shamir Scheme
-
Springer-Verlag
-
Ohta, K., Okamoto, T.: A Modification of the Fiat-Shamir Scheme. Proc. of Crypto’88, LNCS 403, Springer-Verlag (1990) 232–243
-
(1990)
Proc. of Crypto’88, LNCS 403
, pp. 232-243
-
-
Ohta, K.1
Okamoto, T.2
-
24
-
-
84875762817
-
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
-
Springer-Verlag
-
Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. Proc. of Crypto’92, LNCS 740, Springer-Verlag, (1993) 31–53
-
(1993)
Proc. of Crypto’92, LNCS 740
, pp. 31-53
-
-
Okamoto, T.1
-
25
-
-
85028776188
-
On the Relationship among Cryptographic Physical Assumptions
-
Springer-Verlag
-
Okamoto, T.: On the Relationship among Cryptographic Physical Assumptions. Proc. of ISAAC’93, LNCS 762, Springer-Verlag, (1993) 369–378
-
(1993)
Proc. of ISAAC’93, LNCS 762
, pp. 369-378
-
-
Okamoto, T.1
-
26
-
-
0025152622
-
One-Way Functions are Necessary and Sufficient for Secure Signature
-
Rompel, J.: One-Way Functions are Necessary and Sufficient for Secure Signature. Proc. of STOC (1990) 387–394
-
(1990)
Proc. of STOC
, pp. 387-394
-
-
Rompel, J.1
-
27
-
-
12344258539
-
Efficient Signature Generation by Smart Cards
-
Schnorr, C. P.: Efficient Signature Generation by Smart Cards. J. of Cryptology, 4,3 (1991) 161–174
-
(1991)
J. of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
|