![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
IACR Cryptology ePrint Archive, Volume 1999
Volume 1999, 1999
- Ronald Cramer, Victor Shoup:
Signature Schemes Based on the Strong RSA Assumption. 1 - Oded Goldreich, Dana Ron, Madhu Sudan:
Chinese Remaindering with Errors. 2 - Ivan Damgård:
An error in the mixed adversary protocol by Fitzi, Hirt and Maurer. 3 - Shai Halevi, Hugo Krawczyk:
Public-key cryptography and password protocols. 4 - Daniele Micciancio:
Lattice Based Cryptography: A Global Improvement. 5 - (Withdrawn) Fast Proof of Plaintext-Knowledge and Deniable Authentication Based on Chinese Remainder Theorem. 6
- Michel Abdalla, Mihir Bellare, Phillip Rogaway:
DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem. 7 - Jan Camenisch, Ivan Damgård:
Verifiable Encryption and Applications to Group Signatures and Signature Sharing. 8 - Satoshi Hada, Toshiaki Tanaka:
On the Existence of 3-Round Zero-Knowledge Protocols. 9 - Satoshi Hada, Toshiaki Tanaka:
A Relationship between One-Wayness and Correlation Intractability. 10 - Victor Shoup:
Practical Threshold Signatures. 11 - Victor Shoup:
On Formal Models for Secure Key Exchange. 12 - Rosario Gennaro, Shai Halevi, Tal Rabin:
Secure Hash-and-Sign Signatures without the Random Oracle. 13 - Ivan Damgård:
Concurrent Zero-Knowledge is Easy in Practice. 14 - Oded Goldreich, Shafi Goldwasser, Silvio Micali:
Interleaved Zero-Knowledge in the Public-Key Model. 15 - Mihir Bellare, Sara K. Miner:
A forward-secure digital signature scheme. 16 - Victor Shoup:
A Composition Theorem for Universal One-Way Hash Functions. 17 - Mihir Bellare, Amit Sahai:
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. 18 - Johan Håstad, Mats Näslund:
Security of all RSA and Discrete Log Bits. 19 - Silvio Micali, Leonid Reyzin:
Improving the Exact Security of Digital Signature Schemes. 20 - Maurizio Kliban Boyarsky:
Public-Key Cryptography and Password Protocols: The Multi-User Case. 21 - Ran Canetti, Oded Goldreich, Shafi Goldwasser, Silvio Micali:
Resettable Zero-Knowledge. 22 - Cynthia Dwork, Moni Naor, Amit Sahai:
Concurrent Zero-Knowledge. 23 - Mihir Bellare, Russell Impagliazzo:
A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion. 24
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.