One-way functions are necessary and sufficient for secure signatures (1990)

Cached

Download Links

by John Rompel
Citations:197 - 0 self

Documents Related by Co-Citation

313 Universal One-Way Hash Functions and their Cryptographic Applications – Moni Naor, Moti Yung - 1989
1172 Probabilistic encryption – S Goldwasser, S Micali - 1984
827 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
2693 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
513 Theory and Application of Trapdoor Functions – A C Yao - 1982
2895 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
725 Pseudo-Random Generation from One-Way Functions – Johan Håstad, Russell Impagliazzo, Leonid A. Levin, Michael Luby - 1988
625 How to Construct Random Functions – O Goldreich, S Goldwasser, S Micali - 1986
356 A hard-core predicate for all one-way functions – Oded Goldreich, Leonid A. Levint - 1989
603 How to Generate Cryptographically Strong Sequences of PseudoRandom Bits – M Blum, S Micali - 1984
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
447 Non-Malleable Cryptography – Danny Dolev, Cynthia Dwork, Moni Naor - 2000
460 A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack – Ronald Cramer, Victor Shoup - 1998
289 A Design Principle for Hash Functions – Ivan Damg˚ard - 1990
1109 A public key cryptosystem and a signature scheme based on discrete logarithms – T ElGamal - 1985
515 How to play any mental game or a completeness theorem for protocols with honest majority – O Goldreich, S Micali, A Wigderson - 1987
161 Proofs that Yield Nothing But their Validity and a Methodology of Cryptographic Protocol Design – O Goldreich, S Micali, A Wigderson - 1986
166 Multiple Non-Interactive Zero-Knowledge Proofs Under General Assumptions – U Feige, D Lapidot, A Shamir - 1999
228 Bit Commitment Using Pseudo-Randomness – Moni Naor - 1991