Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
暂无分享,去创建一个
[1] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[2] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[5] Hugh C. Williams,et al. Some Public Key Crypto-Functions as Intractable as Factorization , 1985, CRYPTO.
[6] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[7] Josh Benaloh. Verifiable secret-ballot elections , 1987 .
[8] Hideki Imai,et al. Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.
[9] Joan Feigenbaum,et al. Locally Random Reductions in Interactive Complexity Theory , 1990, Advances In Computational Complexity Theory.
[10] Saad M. KALlPHA,et al. New public-key cryptosystem , 1990 .
[11] Tatsuaki Okamoto,et al. New Public-Key Schemes Based on Elliptic Curves over the Ring Zn , 1991, CRYPTO.
[12] Dongho Won,et al. A Generalization of Public Key Residue Cryptosystem , 1993 .
[13] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[14] A. Salomaa,et al. Chinese remainder theorem: applications in computing, coding, cryptography , 1996 .
[15] C. Ding. Chinese remainder theorem , 1996 .
[16] U. Maurer,et al. On the complexity of breaking the Diffie-Hellman protocol , 1996 .
[17] E. Okamoto,et al. Faster factoring of integers of a special form , 1996 .
[18] Louis Goubin,et al. Trapdoor one-way permutations and multivariate polynominals , 1997, ICICS.
[19] Ronald Cramer,et al. A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .
[20] Jacques Stern,et al. A New Public-Key Cryptosystem , 1997, EUROCRYPT.
[21] Scott A. Vanstone,et al. Elliptic curve cryptosystems using curves of smooth order over the ring Zn , 1997, IEEE Trans. Inf. Theory.
[22] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[23] Christian F. Tschudin,et al. On Software Protection via Function Hiding , 1998, Information Hiding.
[24] Jacques Stern,et al. Cryptanalysis of the Ajtai-Dwork Cryptosystem , 1998, CRYPTO.
[25] Jacques Stern,et al. A new public key cryptosystem based on higher residues , 1998, CCS '98.
[26] Jennifer Seberry,et al. Public Key Cryptography , 2000, Lecture Notes in Computer Science.