메뉴 건너뛰기




Volumn , Issue , 2001, Pages

Cryptography as a Network Service

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; NETWORK ARCHITECTURE; NETWORK SECURITY;

EID: 85030103075     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (25)
  • 6
    • 84957610823 scopus 로고    scopus 로고
    • Speeding up discrete log and factoring based schemes via precomputation
    • K. Nyberg, editor, pages Espoo, Finland, Springer-Verlag
    • V. Boyko, M. Peinado, and R. Venkatesan. Speeding up discrete log and factoring based schemes via precomputation. In K. Nyberg, editor, Advances in Cryptology – EUROCRYPT’98, number 1403 in LNCS, pages 221–235, Espoo, Finland, 1998. Springer-Verlag.
    • (1998) Advances in Cryptology – EUROCRYPT’98, number 1403 in LNCS , pp. 221-235
    • Boyko, V.1    Peinado, M.2    Venkatesan, R.3
  • 7
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. In Proceedings of EUROCRYPT’99, pages 402–414, 1999.
    • (1999) Proceedings of EUROCRYPT’99 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 8
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • R. L. Rivest, A. Sherman, and D. Chaum, editors, pages New York, Plenum Press
    • D. Chaum. Blind signatures for untraceable payments. In R. L. Rivest, A. Sherman, and D. Chaum, editors, Proc. CRYPTO 82, pages 199–203, New York, 1983. Plenum Press.
    • (1983) Proc. CRYPTO , vol.82 , pp. 199-203
    • Chaum, D.1
  • 11
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Y. G. Desmedt, editor, pages Springer, Lecture Notes in Computer Scienc 839
    • R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Y. G. Desmedt, editor, Proc. CRYPTO 95, pages 174–187. Springer, 1994. Lecture Notes in Computer Science No. 839.
    • (1994) Proc. CRYPTO 95 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 12
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • G. Brassard, editor, pages Springer-Verlag, Lecture Notes in Computer Scienc 435
    • Y. Desmedt and Y. Frankel. Threshold cryptosystems. In G. Brassard, editor, Proc. CRYPTO 89, pages 307–315. Springer-Verlag, 1990. Lecture Notes in Computer Science No. 435.
    • (1990) Proc. CRYPTO , vol.89 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 14
    • 85034638281 scopus 로고
    • Encrypting problem instances: Or...can you take advantage of someone without having to trust him?
    • H. C. Williams, editor, pages Springer, Lecture Notes in Computer Scienc 218
    • J. Feigenbaum. Encrypting problem instances: Or...can you take advantage of someone without having to trust him? In H. C. Williams, editor, Proc. CRYPTO 85, pages 477–488. Springer, 1986. Lecture Notes in Computer Science No. 218.
    • (1986) Proc. CRYPTO , vol.85 , pp. 477-488
    • Feigenbaum, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.