The Bit Security of Paillier's Encryption Scheme and Its Applications
暂无分享,去创建一个
Rosario Gennaro | Dario Catalano | Nick Howgrave-Graham | Nick Howgrave-Graham | D. Catalano | R. Gennaro
[1] Adi Shamir,et al. The Discrete Logarithm Modulo a Composite Hides O(n) Bits , 1993, J. Comput. Syst. Sci..
[2] Claus-Peter Schnorr,et al. Stronger Security Proofs for RSA and Rabin Bits , 1997, EUROCRYPT.
[3] Walter Fumy,et al. Advances in Cryptology — EUROCRYPT ’97 , 2001, Lecture Notes in Computer Science.
[4] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[5] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[6] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[7] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[8] Oded Goldreich,et al. RSA and Rabin Functions: Certain Parts are as Hard as the Whole , 1988, SIAM J. Comput..
[9] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[10] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[11] Manuel Blum,et al. An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information , 1985, CRYPTO.
[12] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[13] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[14] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[15] Sarvar Patel,et al. An Efficient Discrete Log Pseudo Random Generator , 1998, CRYPTO.
[16] Josh Benaloh. Verifiable secret-ballot elections , 1987 .