|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 287 occurrences of 168 keywords
|
|
|
Results
Found 579 publication records. Showing 579 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
120 | Dario Catalano, Ivan Visconti |
Hybrid Trapdoor Commitments and Their Applications. |
ICALP |
2005 |
DBLP DOI BibTeX RDF |
|
102 | Yevgeniy Dodis, Leonid Reyzin |
On the Power of Claw-Free Permutations. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
|
98 | Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng, Qin-Zhong Ye |
Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
98 | Mihir Bellare, Shai Halevi, Amit Sahai, Salil P. Vadhan |
Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
95 | Huafei Zhu, Feng Bao 0001, Robert H. Deng |
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
Homomorphic trapdoor one-way permutation, sequential aggregate signature, signature scheme |
88 | Yan-Cheng Chang, Chun-Yuan Hsiao, Chi-Jen Lu |
The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Private information retrieval, Cryptographic primitives, Black-box reductions, Trapdoor functions, One-way permutations |
77 | Kai-Yuen Cheong, Takeshi Koshiba |
Reducing Complexity Assumptions for Oblivious Transfer. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
trapdoor one-way functions, oblivious transfer |
77 | Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi |
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
imaginary quadratic order, trapdoor decryption, factorization, Public key cryptosystem, key escrow |
75 | Vincent Rijmen, Bart Preneel |
A Family of Trapdoor Ciphers. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|
72 | Chris Peikert, Brent Waters |
Lossy trapdoor functions and their applications. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
public key encryption, trapdoor functions |
68 | Alon Rosen, Gil Segev 0001 |
Chosen-Ciphertext Security via Correlated Products. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
68 | Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu |
On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
65 | Adam L. Young, Moti Yung |
Towards Signature-Only Signature Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST |
63 | Katja Schmidt-Samoa, Tsuyoshi Takagi |
Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Marc Fischlin |
On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
|
61 | Dong Su, Kewei Lv |
A New Hard-Core Predicate of Paillier's Trapdoor Function. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Paillier’s trapdoor function, Hard-core Predicate, Most significant bit |
57 | Dario Catalano, Yevgeniy Dodis, Ivan Visconti |
Mercurial Commitments: Minimal Assumptions and Efficient Constructions. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Eike Kiltz, Krzysztof Pietrzak |
On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Padding-based encryption, ideal trapdoor permutations, black-box, OAEP |
52 | Bogdan Groza |
An Extension of the RSA Trapdoor in a KEM/DEM Framework. |
SYNASC |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Iftach Haitner |
Implementing Oblivious Transfer Using Collection of Dense Trapdoor Permutations. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Rosario Gennaro |
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Eyal Kushilevitz, Rafail Ostrovsky |
One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
52 | Pascal Paillier |
A Trapdoor Permutation Equivalent to Factoring. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
49 | ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng |
Constructing parallel long-message signcryption scheme from trapdoor permutation. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
parallel, signcryption, authenticated encryption, trapdoor permutations |
49 | Edlyn Teske |
An Elliptic Curve Trapdoor System. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Weil descent, Elliptic curve cryptography, Key escrow, Isogenies, Trapdoor functions |
49 | Mihir Bellare, Silvio Micali |
How to Sign Given Any Trapdoor Permutation. |
J. ACM |
1992 |
DBLP DOI BibTeX RDF |
cryptography, digital signatures, randomness, trapdoor functions |
45 | Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy |
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Blind identity-based encryption, public key encryption with keyword search, searchable encryption |
45 | Iftach Haitner, Jonathan J. Hoch, Gil Segev 0001 |
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Yi Mu 0001 |
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
On-line/off-line signatures, Key exposure, Chameleon hashing |
45 | Gilles Brassard |
How to Improve Signature Schemes. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
43 | Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka |
Efficient Non-interactive Universally Composable String-Commitment Schemes. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
non-interactive string commitment, all-but-one trapdoor functions, homomorphism, universal composability |
43 | Craig Gentry, Chris Peikert, Vinod Vaikuntanathan |
Trapdoors for hard lattices and new cryptographic constructions. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
lattice-based cryptography, trapdoor functions |
43 | Jintai Ding, Christopher Wolf, Bo-Yin Yang |
l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Trapdoor, Encryption, Public Key, Signing |
43 | Kaoru Kurosawa, Katja Schmidt-Samoa |
New Online/Offline Signature Schemes Without Random Oracles. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Online/offline signatures, trapdoor hash, division intractability, strong RSA assumption |
43 | Kaoru Kurosawa, Swee-Huay Heng |
The Power of Identification Schemes. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
trapdoor commitment scheme, on-line/off-line, signature scheme, Identification scheme, identity-based |
43 | Jung Youp Lee, Seok Won Jung, Jongin Lim 0001 |
Detecting Trapdoors in Smart Cards Using Timing and Power Analysis. |
TestCom |
2005 |
DBLP DOI BibTeX RDF |
Trapdoor, Smart Card, Timing Analysis, Power Analysis |
43 | Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue |
Efficient Non-interactive Deniable Authentication Protocols. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
Tight security, Authentication, Digital signature, MAC, Deniablity, Impersonation attack, Trapdoor permutations |
43 | Volker Roth 0002, Kai Richter 0002, Rene Freidinger |
A PIN-entry method resilient against shoulder surfing. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
cognitive trapdoor games, ATM, password, PIN, shoulder surfing |
43 | Michel Abdalla, Bogdan Warinschi |
On the Minimal Assumptions of Group Signature Schemes. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
minimal assumptions, Group signatures, one-way functions, trapdoor permutations |
43 | Jiejun Kong, Xiaoyan Hong |
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. |
MobiHoc |
2003 |
DBLP DOI BibTeX RDF |
trapdoor, mobile ad-hoc network, broadcast, anonymity, pseudonymity, on-demand routing, untraceability |
43 | Daniele Micciancio |
Improving Lattice Based Cryptosystems Using the Hermite Normal Form. |
CaLC |
2001 |
DBLP DOI BibTeX RDF |
Lattices, public-key encryption, trapdoor functions |
43 | Adi Shamir, Yael Tauman |
Improved Online/Offline Signature Schemes. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
on-line/off-line, trapdoor hash functions, signature schemes |
41 | Jonathan Katz, Arkady Yerukhimovich |
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Edward A. Hirsch, Sergey I. Nikolenko |
A Feebly Secure Trapdoor Function. |
CSR |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Haim H. Permuter, Paul Cuff, Benjamin Van Roy, Tsachy Weissman |
Capacity of the Trapdoor Channel With Feedback. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Kingo Kobayashi |
Capacity Problem of Trapdoor Channel. |
GTIT-C |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Louis Granboulan |
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham |
Paillier's Trapdoor Function Hides up to O(n) Bits. |
J. Cryptol. |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Glenn A. Orton |
A Multiple-Iterated Trapdoor for Dense Compact Knapsacks. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
41 | Mihir Bellare, Moti Yung |
Certifying Cryptographic Tools: The Case of Trapdoor Permutations. |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
41 | Vijay Varadharajan |
Trapdoor Rings and Their Use in Cryptography. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
41 | R. M. F. Goodman, Anthony J. McAuley |
A New Trapdoor Knapsack Public-Key Cryptosystem. |
EUROCRYPT |
1984 |
DBLP DOI BibTeX RDF |
cryptography, codes, knapsack problem, public key, ciphers |
40 | Yael Gertner, Sampath Kannan, Tal Malkin, Omer Reingold, Mahesh Viswanathan 0001 |
The Relationship between Public Key Encryption and Oblivious Transfer. |
FOCS |
2000 |
DBLP DOI BibTeX RDF |
trapdoor predicates, cryptography, protocols, protocols, public key cryptography, key agreement, public key encryption, public-key encryption, oblivious transfer, secure multi-party computation, primitives, black-box reductions, trapdoor permutations |
36 | Xu An Wang 0001, Yunxuan Su, Jindan Zhang |
Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes. |
NaNA |
2021 |
DBLP DOI BibTeX RDF |
|
36 | Chen Qian 0002 |
Lossy trapdoor primitives, zero-knowledge proofs and applications. (Les primitives lossy trapdoor, preuve à divulgation nulle de connaissance et applications). |
|
2019 |
RDF |
|
36 | Mohammad Hajiabadi |
Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
36 | Mohammad Hajiabadi |
Enhancements are Blackbox Non-trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations. |
TCC (1) |
2018 |
DBLP DOI BibTeX RDF |
|
36 | Haiyang Xue, Xianhui Lu, Bao Li 0001, Yamin Liu |
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation. |
ProvSec |
2014 |
DBLP DOI BibTeX RDF |
|
36 | Yael Gertner, Tal Malkin, Omer Reingold |
On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates. |
FOCS |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Tatsuaki Okamoto, Katsuyuki Takashima |
Homomorphic Encryption and Signatures from Vector Decomposition. |
Pairing |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Sébastien Canard, Fabien Laguillaumie, Michel Milhau |
TrapdoorSanitizable Signatures and Their Application to Content Protection. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Benoît Libert, Jean-Jacques Quisquater |
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
time capsule signatures, standard model, bilinear maps |
34 | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Farshid Delgosha, Faramarz Fekri |
Public-key cryptography using paraunitary matrices. |
IEEE Trans. Signal Process. |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank |
Black-box constructions for secure computation. |
STOC |
2006 |
DBLP DOI BibTeX RDF |
theory of cryptography, oblivious transfer, secure computation, black-box reductions |
34 | P. J. Abisha, D. Gnanaraj Thomas, K. G. Subramanian 0001 |
Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Finitely Presented Groups, Free Partially Commutative Monoids, Thue Systems, Public Key Cryptosystem, Word Problem, Zero Knowledge Protocol |
34 | Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval |
Key-Privacy in Public-Key Encryption. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Tatsuaki Okamoto, Keisuke Tanaka, Shigenori Uchiyama |
Quantum Public-Key Cryptosystems. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
34 | Takeshi Saito, Kaoru Kurosawa, Kouichi Sakurai |
4 Move Perfect ZKIP of Knowledge with No Assumption. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
34 | Kenji Koyama, Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone |
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
31 | Rafael Pass, Hoeteck Wee |
Black-Box Constructions of Two-Party Protocols from One-Way Functions. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
black-box constructions, zero-knowledge arguments, trapdoor commitments, parallel coin-tossing, non-malleable commitments, secure two-party computation |
31 | Taek-Young Youn, Young-Ho Park 0001, Chang Han Kim, Jongin Lim 0001 |
An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
double trapdoor decryption mechanism, privacy, public key cryptosystem, semantic security |
31 | Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, Louis Goubin |
A Fast and Secure Implementation of Sflash. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai cryptosystem C*, C*- trapdoor function, Digital Signatures, Smart cards, DPA, PKI, Power Analysis, SPA, portable devices, Addition Chains, Multivariate Cryptography, HFE |
29 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. |
Des. Codes Cryptogr. |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
29 | Dan Boneh, Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, Brent Waters |
On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. |
FOCS |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
cryptography, digital signature, information security |
29 | Dario Catalano, David Pointcheval, Thomas Pornin |
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication. |
J. Cryptol. |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Julien Bringer, Hervé Chabanne, Quoc Dung Do |
A fuzzy sketch with trapdoor. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Alexander W. Dent, Steven D. Galbraith |
Hidden Pairings and Trapdoor DDH Groups. |
ANTS |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Lan Nguyen, Reihaneh Safavi-Naini |
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham |
Sequential Aggregate Signatures from Trapdoor Permutations. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Philip D. MacKenzie, Ke Yang 0005 |
On Simulation-Sound Trapdoor Commitments. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Yvo Desmedt, Peter Landrock, Arjen K. Lenstra, Kevin S. McCurley, Andrew M. Odlyzko, Rainer A. Rueppel, Miles E. Smid |
The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel). |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
29 | Valtteri Niemi |
A New Trapdoor in Knapsacks. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
29 | Mihir Bellare, Silvio Micali |
How To Sign Given Any Trapdoor Function. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
29 | P. Schöbe, James L. Massey |
Fast Authentication in a Trapdoor - Knapsack Public Key Cryptosystem. |
EUROCRYPT |
1982 |
DBLP DOI BibTeX RDF |
|
23 | Sherman S. M. Chow |
Real Traceable Signatures. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
efficient tracing, anonymity management, group signatures, standard model, bilinear groups, traceable signatures |
23 | Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa |
Efficient Public Key Encryption Based on Ideal Lattices. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Chunming Tang 0003, Dingyi Pei, Xiaofeng Wang, Zhuojun Liu |
Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
delegateable signature, non-interactive witness indistinguishable, non-interactive witness hiding, ?-protocol, non-interactive zero-knowledge |
23 | Mike Burmester, Breno de Medeiros, Rossana Motta |
Robust, anonymous RFID authentication with constant key-lookup. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
provably secure protocols, privacy, scalability, RFID, availability, unlinkability |
23 | Iftach Haitner |
Semi-honest to Malicious Oblivious Transfer - The Black-Box Way. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Dario Catalano, Dario Fiore 0001, Mariagrazia Messina |
Zero-Knowledge Sets with Short Proofs. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Huafei Zhu |
Round Optimal Universally Composable Oblivious Transfer Protocols. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
Double trap-door cryptosystems, simulator, oblivious transfer, universally composable |
23 | Qiong Huang 0001, Duncan S. Wong, Yiming Zhao |
Generic Transformation to Strongly Unforgeable Signatures. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Emmanuel Bresson, Dario Catalano, Rosario Gennaro |
Improved On-Line/Off-Line Threshold Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Mark Manulis |
Democratic group signatures: on an example of joint ventures. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang |
Tractable Rational Map Signature. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
tractable rational maps, digital signature, finite field, public key, multivariate |
23 | Yang Cui 0001, Kazukuni Kobara, Hideki Imai |
A Generic Conversion with Optimal Redundancy. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Rafael Pass, Alon Rosen |
New and improved constructions of non-malleable cryptographic protocols. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
non black-box simulation, cryptography, zero-knowledge, non-malleability, round-complexity, man-in-the-middle |
23 | Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish |
Versatile padding schemes for joint signature and encryption. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
extractable commitments, feistel transform, joint signature and encryption, universal padding schemes, signcryption |
Displaying result #1 - #100 of 579 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|