-
1
-
-
85040155621
-
Subexponential Algorithm for The Discrete Logarithm Problem
-
San Juan, PR (Oct
-
Adleman, L. “Subexponential Algorithm for The Discrete Logarithm Problem.” Proc.20thIEEE Symp. on Foundations of Computer Science, San Juan, PR (Oct. 1979), 55–60.
-
(1979)
Proc.20Thieee Symp. on Foundations of Computer Science
, pp. 55-60
-
-
Adleman, L.1
-
5
-
-
85034841005
-
A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data
-
Oakland, CA (Apr
-
Blakley, G. and Meadows, C. “A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.” Proc. IEEE Symposium on Computer Security and Privacy, Oakland, CA (Apr. 1985).
-
(1985)
Proc. IEEE Symposium on Computer Security and Privacy
-
-
Blakley, G.1
Meadows, C.2
-
6
-
-
0022199386
-
Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults
-
Portland, OR
-
Chor, B., Goldwasser, S., Micali, S., and Awerbuch, B. “Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults.” Proc. 26thIEEE Symp. on Foundations of Computer Science, Portland, OR (Oct. 1985), 383–395.
-
(1985)
Proc. 26Thieee Symp. on Foundations of Computer Science
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
8
-
-
0003654886
-
-
TR-454, Yale University, Departement of Computer Science, New Haven, CT (Feb
-
Cohen, J. “Improving Privacy in Cryptographic Elections.” TR-454, Yale University, Departement of Computer Science, New Haven, CT (Feb. 1986).
-
(1986)
Improving Privacy in Cryptographic Elections
-
-
Cohen, J.1
-
9
-
-
0022953575
-
-
Algorithmica
-
Coppersmith, D., Odlyzko, A., and Schroeppel, R. “Discrete Logarithms in GF(p).” Algorithmica, 1 (1986), 1–15.
-
(1986)
Discrete Logarithms in Gf(P)
, vol.1
, pp. 1-15
-
-
Coppersmith, D.1
Odlyzko, A.2
Schroeppel, R.3
-
10
-
-
84976671974
-
Cryptographic Protocols
-
San Francisco, CA (May
-
DeMillo, R., Lynch, N., and Merritt, M. “Cryptographic Protocols.” Proc. 14thACM Symp. on Theory of Computing, San Francisco, CA (May 1982), 383–400.
-
(1982)
Proc. 14Thacm Symp. on Theory of Computing
, pp. 383-400
-
-
Demillo, R.1
Lynch, N.2
Merritt, M.3
-
11
-
-
85034638281
-
Encrypting Problem Instances or Can You Take Advantage of Someone Without Having to Trust Him
-
Santa Barbara, CA (Aug, Published as Advances in Cryptology, ed. by H. Williams in Lecture Notes in Computer Science, ed. by G. Goos and J. Hartmanis. Springer-Verlag, New York
-
Feigenbaum, J. “Encrypting Problem Instances or Can You Take Advantage of Someone Without Having to Trust Him”, Proc. Crypto’ 85, Santa Barbara, CA (Aug. 1985), 477–488. Published as Advances in Cryptology, ed. by H. Williams in Lecture Notes in Computer Science, vol. 218, ed. by G. Goos and J. Hartmanis. Springer-Verlag, New York (1985).
-
(1985)
Proc. Crypto’ 85
, vol.218
, pp. 477-488
-
-
Feigenbaum, J.1
-
12
-
-
85034823910
-
-
Presented at Eurocrypt84, Paris, France (Apr, Not in proceedings
-
Fischer, M., Micali, S., and Rackoff, C. “A Secure Protocol for the Oblivious Transfer.” Presented at Eurocrypt84, Paris, France (Apr. 1984). (Not in proceedings.)
-
(1984)
A Secure Protocol for the Oblivious Transfer
-
-
Fischer, M.1
Micali, S.2
Rackoff, C.3
-
13
-
-
0021941417
-
The Knowledge of Complexity of Interactive Proof-Systems
-
Providence, RI (May
-
Goldwasser, S., Micali, S., and Rackoff C. “The Knowledge of Complexity of Interactive Proof-Systems.” Proc. 17thACM Symp. on Theory of Computing, Providence, RI (May 1985), 291–304.
-
(1985)
Proc. 17Thacm Symp. on Theory of Computing
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
15
-
-
85023433586
-
Generalized Linear Threshold Scheme
-
Santa Barbara, CA (Aug, Published as Advances in Cryptology, ed. by G. Blakely and D. Chaum in Lecture Notes in Computer Science, ed. by G. Goos and J. Hartmanis. Springer-Verlag, New York
-
Kothari, S. “Generalized Linear Threshold Scheme.” Proc. Crypto’ 84, Santa Barbara, CA (Aug. 1984), 231–241. Published as Advances in Cryptology, ed. by G. Blakely and D. Chaum in Lecture Notes in Computer Science, vol. 196, ed. by G. Goos and J. Hartmanis. Springer-Verlag, New York (1985).
-
(1984)
Proc. Crypto’ 84
, vol.196
, pp. 231-241
-
-
Kothari, S.1
-
16
-
-
84919085619
-
An Improved Algorithm for Computing Logarithms Over GF(2) and Its Cryptographic Significance.”
-
Jan
-
Pohlig, S. and Hellman, M. “An Improved Algorithm for Computing Logarithms Over GF(2) and Its Cryptographic Significance.” IEEE Trans. on Information Theory 24,1 (Jan. 1978), 106–110.
-
(1978)
IEEE Trans. on Information Theory
, vol.24
, Issue.1
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
17
-
-
0005301490
-
On Data Banks and Privacy Homomorphisms
-
ed. by R. A. DeMillo, et al. Academic Press, New York
-
Rivest, R., Adleman, L., and Dertouzos, M. “On Data Banks and Privacy Homomorphisms.” Foundations of Secure Computation, ed. by R. A. DeMillo, et al. Academic Press, New York (1978), 169–179.
-
(1978)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.1
Adleman, L.2
Dertouzos, M.3
|