Efficient encryption and storage of close distance messages with applications to cloud storage | 0 | 0.34 | 2012 |
Adaptively secure distributed public-key systems | 23 | 1.11 | 2002 |
Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings | 21 | 2.98 | 2002 |
Adaptive Security for the Additive-Sharing Based Proactive RSA | 17 | 0.72 | 2001 |
Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings | 33 | 4.87 | 2001 |
Protecting Digital Rights | 0 | 0.34 | 2001 |
Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings | 17 | 3.99 | 2001 |
Sharing Block Ciphers | 12 | 1.52 | 2000 |
Exact Analysis of Exact Change: The k-Payment Problem | 1 | 0.77 | 2000 |
"Psyeudorandom Intermixing": A Tool for Shared Cryptography | 2 | 0.40 | 2000 |
Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control" | 2 | 0.38 | 1999 |
Existence of multiplicative secret sharing schemes with polynomial share expansion | 1 | 0.43 | 1999 |
Adaptively-Secure Optimal-Resilience Proactive RSA | 22 | 0.91 | 1999 |
Adaptively-secure distributed public-key systems | 2 | 0.36 | 1999 |
On Enabling Secure Applications Through Off-Line Biometric Identification. | 168 | 28.62 | 1998 |
Easy Come - Easy Go Divisible Cash | 102 | 6.86 | 1998 |
Distributed Public Key Cryptosystems | 12 | 0.87 | 1998 |
Fair Off-Line e-cash Made Easy | 38 | 1.44 | 1998 |
Efficient key distribution for slow computing devices: achieving fast over the air activation for wireless systems | 3 | 0.69 | 1998 |
An Attack on RSA Given a Small Fraction of the Private Key Bits | 86 | 5.83 | 1998 |
How to Say "YES" with Smart Cards | 0 | 0.34 | 1998 |
Robust efficient distributed RSA-key generation | 74 | 6.96 | 1998 |
Beyond Identity: Warranty-Based Digital Signature Transactions | 2 | 0.50 | 1998 |
On Characterization of Escrow Encryption Schemes | 3 | 0.58 | 1997 |
Exact Analysis of Exact Change | 2 | 0.69 | 1997 |
Anonymity Control in E-Cash Systems | 54 | 3.08 | 1997 |
Proactive RSA. | 79 | 9.72 | 1997 |
Mis-representation of Identities in E-cash Schemes and how to Prevent it | 12 | 1.30 | 1996 |
Witness-based cryptographic program checking and applications (an announcement) | 5 | 2.97 | 1996 |
"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash | 83 | 5.68 | 1996 |
Witness-based cryptographic program checking and robust function sharing | 41 | 7.05 | 1996 |
Escrow Encryption Systems Visited: Attacks, Analysis and Designs | 34 | 2.96 | 1995 |
Cryptoanalysis of the Immunized LL Public Key Systems | 7 | 1.58 | 1995 |
Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group | 50 | 3.35 | 1994 |
How to share a function securely | 146 | 20.08 | 1994 |
Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract) | 7 | 0.64 | 1992 |
Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract) | 1 | 0.37 | 1992 |
Shared Generation of Authenticators and Signatures (Extended Abstract) | 98 | 8.51 | 1991 |
A practical protocol for large group oriented networks | 48 | 7.98 | 1989 |