Active Bibliography

25 Design Validations for Discrete Logarithm Based Signature Schemes – Ernest Brickell, David Pointcheval, Serge Vaudenay, Moti Yung - 2000
283 Security Arguments for Digital Signatures and Blind Signatures – David Pointcheval, Jacques Stern - 2000
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
13 Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks – Jonathan Katz - 2002
204 Optimal Asymmetric Encryption – How to Encrypt with RSA – Mihir Bellare, Phillip Rogaway - 1995
1 A New Suggestion for How to Encrypt with RSA – Mihir Bellare, Phillip Rogaway - 1994
193 Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack – Ronald Cramer, Victor Shoup - 2001
K. Kim and T. Matsumoto Eds. Springer-Verlag, LNCS 1163, pages 252–265. Provably Secure Blind Signature Schemes – David Pointcheval, Jacques Stern
69 Provably Secure Blind Signature Schemes – David Pointcheval, Jacques Stern - 1996
1 Cryptography in Constant Parallel Time – Benny Applebaum - 2007
106 Towards realizing random oracles: Hash functions that hide all partial information – Ran Canetti - 1997
5 The Validation of Cryptographic Algorithms – Jacques Stern - 1996
144 The Security of Cipher Block Chaining – M. Bellare, J. Kilian, P. Rogaway - 1994
209 Security Proofs for Signature Schemes – David Pointcheval, Jacques Stern - 1996
Incremental Cryptography: The Case of Hashing and Signing – Bellare Goldreich Goldwasser, M. Bellare, O. Goldreich, S. Goldwasser - 1994
150 Number-theoretic constructions of efficient pseudo-random functions – Moni Naor, Omer Reingold - 1997
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
10 Bounds on the Efficiency of Encryption and Digital Signatures – Rosario Gennaro, Yael Gertner, Jonathan Katz - 2002
3 ACE: The Advanced Cryptographic Engine – Thomas Schweinberger, Victor Shoup - 2000