-
2
-
-
84982943258
-
Non-interactive and information-theoretic secure veriable secret sharing
-
J. Feigenbaum, editor, Springer, Lecture Notes in Computer Science 576
-
T. P. Pedersen. Non-interactive and information-theoretic secure veriable secret sharing. In J. Feigenbaum, editor, Proceedings CRYPTO '91, pages 129-140. Springer, 1992. Lecture Notes in Computer Science No. 576.
-
(1992)
Proceedings CRYPTO '91
, pp. 129-140
-
-
Pedersen, T.P.1
-
3
-
-
84957705004
-
An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm
-
Springer-Verlag, Berlin Heidelberg New York
-
N. Koblitz, An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. In: Advances in Cryptology - Crypto '98. Lecture Notes in Computer Science, Vol. 1462. Springer-Verlag, Berlin Heidelberg New York (1998) 327-337
-
(1998)
Advances in Cryptology - Crypto '98. Lecture Notes in Computer Science
, vol.1462
, pp. 327-337
-
-
Koblitz, N.1
-
4
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. J. Menezes, T. Okamoto, and S. A. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. Inform. Theory, 39 (1993), pp. 1639-1646
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.J.1
Okamoto, T.2
Vanstone, S.A.3
-
5
-
-
33645675202
-
-
Technical Report 95-03, Department of Computer Science, University ofArizona, Feb
-
R. Schroeppel, H-. Ormani, and S. O'Malley. Fast key exchange with elliptic curve systems. Technical Report 95-03, Department of Computer Science, University ofArizona, Feb. 1995.
-
(1995)
Fast key exchange with elliptic curve systems
-
-
Schroeppel, R.1
Ormani, H.2
O'Malley, S.3
-
6
-
-
85150472723
-
An Implementation of Elliptic Curve Cryptosystems over F 2-155 IEEE Journal SelectedAreas in Commutnications
-
June
-
G. B. Agnew, R. C. Mullin, and S. A. Vanstone, "An Implementation of Elliptic Curve Cryptosystems over F 2-155 ", IEEE Journal onl SelectedAreas in Commutnications, Vol. I1, No. 5, June, 1993.
-
(1993)
, vol.11
, Issue.5
-
-
Agnew, G.B.1
Mullin, R.C.2
Vanstone, S.A.3
-
7
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, Elliptic curve cryptosystems, Math. Comp. 48, pp. 203-209, 1987
-
(1987)
Math. Comp.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
8
-
-
0000838441
-
Use of Elliptic Curve in Cryptography
-
Santa Barbara, Calif., 1985), LNCS. Spring- Verlag
-
V.S. Miller, Use of Elliptic Curve in Cryptography, In Advances in CryptologyCRYPTO '85(Santa Barbara, Calif., 1985), LNCS.2 18, Spring- Verlag, pp.417-426, 1986.
-
(1986)
Advances in CryptologyCRYPTO '85
, vol.2
, Issue.18
, pp. 417-426
-
-
Miller, V.S.1
-
9
-
-
0018545449
-
How to Share a Secret
-
November
-
A. Shamir. How to Share a Secret. Communications of the ACM, 22(11), pp. 612-613, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
10
-
-
85022187530
-
Shared generation of authenticators and signatures
-
Science, Springer-Verlag
-
Y. Desmedt and Y. Frankel, Shared generation of authenticators and signatures," In Advances in CryptologylCRYPTO '91, volume 576 of Lecture Notes in Computer Science pages 457-469, Springer-Verlag, 1992.
-
(1992)
Advances in CryptologylCRYPTO '91, volume 576 of Lecture Notes in Computer
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
11
-
-
0027961556
-
How to share a function securely
-
A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung. How to share a function securely. In 26th Annual ACM Symposium on Theory of Computing, pages 522-533, 1994.
-
(1994)
26th Annual ACM Symposium on Theory of Computing
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
12
-
-
0027580298
-
Efficient and secure multiparty generation of digital signatures based on discrete logarithm
-
M. Cerecedo, T. Matsumoto, and H. Imai. Efficient and secure multiparty generation of digital signatures based on discrete logarithm. IEICE Trans. on Fund. Electr. Comm. and Comp. Sci., E76- A(4):532-545, 1993.
-
(1993)
IEICE Trans. on Fund. Electr. Comm. and Comp. Sci.
, vol.76
, Issue.4
, pp. 532-545
-
-
Cerecedo, M.1
Matsumoto, T.2
Imai, H.3
-
13
-
-
0028508211
-
Group-oriented (t,n) threshold digital signature scheme and digital multisignature
-
September
-
L. Ham, "Group-oriented (t,n) threshold digital signature scheme and digital multisignature ", IEE Proc.-Comput. Digit. Tech., Vol. 141, No. 5, September, (1994), pp. 307-313.
-
(1994)
IEE Proc.-Comput. Digit. Tech.
, vol.141
, Issue.5
, pp. 307-313
-
-
Ham, L.1
-
14
-
-
84948004356
-
Threshold DSS Signatures without a Trusted Party
-
LNCS Springer- Verlag
-
Langford, Threshold DSS Signatures without a Trusted Party, Proc. CR YPTO'95, LNCS 963, Springer- Verlag, 1995.
-
(1995)
Proc. CR YPTO'95
, vol.963
-
-
Langford1
-
17
-
-
84947926543
-
Robust Threshold DSS Signatures
-
Springer
-
R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, "Robust Threshold DSS Signatures", Advances in Cryptology: Proc. Eurocrypt'96, Lecture Notes in Computer Science 1070, Springer, (1996), pp. 354-371.
-
(1996)
Advances in Cryptology: Proc. Eurocrypt'96, Lecture Notes in Computer Science
, vol.1070
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
18
-
-
0842304790
-
Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap-Diffie-Hellman-group Signature Scheme
-
A. Boldyreva, "Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap-Diffie-Hellman-group Signature Scheme", Public Key Cryptography - PKC 2003.
-
(2003)
Public Key Cryptography - PKC
-
-
Boldyreva, A.1
-
19
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. El Gamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Informn. Theory 31:469-472, 1985.
-
(1985)
IEEE Trans. Informn. Theory
, vol.31
, pp. 469-472
-
-
El Gamal, T.1
-
20
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. P. Schnorr, Efficient signature generation by smart cards, Journal ofCryptology4:161-174, 1991.
-
(1991)
Journal ofCryptology4
, pp. 161-174
-
-
Schnorr, C.P.1
-
21
-
-
0024940038
-
Non-Cryptographic Fault-Tolerant Computing in a Constant Number ofRounds
-
J. Bar-Ilan, and D. Beaver, "Non-Cryptographic Fault-Tolerant Computing in a Constant Number ofRounds", Proc. of8th PODC, pp. 201-209, 1989.
-
(1989)
Proc. of8th PODC
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
23
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
M. Ben-Or, S. Goldwasser and A. Wigderson, "Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation", 20th STOC, pp. 1-10, 1988.
-
(1988)
20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
24
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
T. Rabin and M. Ben-Or. "Verifiable secret sharing and multiparty protocols with honest majority". In Proc. 21st ACM Symposium on Theory ofComputing, pages 73-85, 1989.
-
(1989)
Proc. 21st ACM Symposium on Theory ofComputing
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
25
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
Springer Verlag
-
A.Herzberg, S.Jarecki, H.Krawczyk, M.Yung, "Proactive secret sharing or: How to cope with perpetual leakage", LNCS 963, Proc. Crypto'95, Springer Verlag, (1995), pp. 339-352.
-
(1995)
LNCS 963, Proc. Crypto'95
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
26
-
-
0010224921
-
Secret sharing homomorphisms: Keeping a secret secret
-
Springer Verlag
-
J.C. Benaloh, "Secret sharing homomorphisms: Keeping a secret secret"; Proc. of Crypto '86, Lecture Notes on Comput. Sci., 263 Springer Verlag (1986) 251-260.
-
(1986)
Proc. of Crypto '86, Lecture Notes on Comput. Sci.
, vol.263
, pp. 251-260
-
-
Benaloh, J.C.1
-
27
-
-
0010224921
-
Secret sharing homomorphisms: Keeping a secret secret
-
Springer Verlag
-
J.C. Benaloh, "Secret sharing homomorphisms: Keeping a secret secret"; Proc. of Crypto '86, Lecture Notes on Comput. Sci., 263 Springer Verlag (1986) 251-260.
-
(1986)
Proc. of Crypto '86, Lecture Notes on Comput. Sci.
, vol.263
, pp. 251-260
-
-
Benaloh, J.C.1
|