Universally composable signature, certification, and authentication
暂无分享,去创建一个
[1] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[2] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[3] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[4] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[5] V. Rich. Personal communication , 1989, Nature.
[6] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[7] Rafail Ostrovsky,et al. Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract) , 1992, CRYPTO.
[8] Birgit Pfitzmann,et al. Sorting out signature schemes , 1993, CCS '93.
[9] Catherine A. Meadows,et al. A logical language for specifying cryptographic protocol requirements , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[10] Hugo Krawczyk,et al. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.
[11] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[12] John C. Mitchell,et al. Probabilistic Polynomial-Time Equivalence and Security Analysis , 1999, World Congress on Formal Methods.
[13] Silvio Micali,et al. Verifiable random functions , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[14] Birgit Pfitzmann,et al. Composition and integrity preservation of secure reactive systems , 2000, CCS.
[15] Moni Naor,et al. Nonmalleable Cryptography , 2000, SIAM Rev..
[16] Ran Canetti,et al. Maintaining Authenticated Communication in the Presence of Break-Ins , 2000, Journal of Cryptology.
[17] Birgit Pfitzmann,et al. Provably Secure Certified Mail , 2000 .
[18] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[19] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[20] Birgit Pfitzmann,et al. A model for asynchronous reactive systems and its application to secure message transmission , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[21] Jörn Müller-Quade,et al. Initiator-Resilient Universally Composable Key Exchange , 2003, ESORICS.
[22] Birgit Pfitzmann,et al. A Universally Composable Cryptographic Library , 2003, IACR Cryptol. ePrint Arch..
[23] Birgit Pfitzmann,et al. Reactively Secure Signature Schemes , 2003, ISC.
[24] Ran Canetti,et al. Universal Composition with Joint State , 2003, CRYPTO.
[25] Birgit Pfitzmann,et al. A General Composition Theorem for Secure Reactive Systems , 2004, TCC.
[26] N. Smart,et al. Security of Signature Schemes in a Multi-User Setting , 2004, Des. Codes Cryptogr..
[27] Bogdan Warinschi,et al. Soundness of Formal Encryption in the Presence of Active Adversaries , 2004, TCC.
[28] Serge Fehr,et al. Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography , 2004, CRYPTO.
[29] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[30] Michael Backes,et al. How to Break and Repair a Universally Composable Signature Functionality , 2004, ISC.
[31] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.