Stop the war!
Остановите войну!
for scientists:
default search action
IACR Cryptology ePrint Archive, Volume 1999
Volume 1999, 1999
- Ronald Cramer, Victor Shoup:
Signature Schemes Based on the Strong RSA Assumption. 1 - Oded Goldreich, Dana Ron, Madhu Sudan:
Chinese Remaindering with Errors. 2 - Ivan Damgård:
An error in the mixed adversary protocol by Fitzi, Hirt and Maurer. 3 - Shai Halevi, Hugo Krawczyk:
Public-key cryptography and password protocols. 4 - Daniele Micciancio:
Lattice Based Cryptography: A Global Improvement. 5 - (Withdrawn) Fast Proof of Plaintext-Knowledge and Deniable Authentication Based on Chinese Remainder Theorem. 6
- Michel Abdalla, Mihir Bellare, Phillip Rogaway:
DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem. 7 - Jan Camenisch, Ivan Damgård:
Verifiable Encryption and Applications to Group Signatures and Signature Sharing. 8 - Satoshi Hada, Toshiaki Tanaka:
On the Existence of 3-Round Zero-Knowledge Protocols. 9 - Satoshi Hada, Toshiaki Tanaka:
A Relationship between One-Wayness and Correlation Intractability. 10 - Victor Shoup:
Practical Threshold Signatures. 11 - Victor Shoup:
On Formal Models for Secure Key Exchange. 12 - Rosario Gennaro, Shai Halevi, Tal Rabin:
Secure Hash-and-Sign Signatures without the Random Oracle. 13 - Ivan Damgård:
Concurrent Zero-Knowledge is Easy in Practice. 14 - Oded Goldreich, Shafi Goldwasser, Silvio Micali:
Interleaved Zero-Knowledge in the Public-Key Model. 15 - Mihir Bellare, Sara K. Miner:
A forward-secure digital signature scheme. 16 - Victor Shoup:
A Composition Theorem for Universal One-Way Hash Functions. 17 - Mihir Bellare, Amit Sahai:
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. 18 - Johan Håstad, Mats Näslund:
Security of all RSA and Discrete Log Bits. 19 - Silvio Micali, Leonid Reyzin:
Improving the Exact Security of Digital Signature Schemes. 20 - Maurizio Kliban Boyarsky:
Public-Key Cryptography and Password Protocols: The Multi-User Case. 21 - Ran Canetti, Oded Goldreich, Shafi Goldwasser, Silvio Micali:
Resettable Zero-Knowledge. 22 - Cynthia Dwork, Moni Naor, Amit Sahai:
Concurrent Zero-Knowledge. 23 - Mihir Bellare, Russell Impagliazzo:
A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion. 24
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.