Введение в криптографию
[an error occurred while processing this directive]

Литература к главе 3 - часть 2


15

Bellare M., Micali S., Ostrovsky R. Perfect zero-knowledge in constant rounds // Proc. 22nd Annu. ACM Symp. on Theory of Computing. 1990. P. 482-493.

16

Kersten A. G. Shared secret Schemes aus geometrisches sicht. Mitteilungen mathem. Seminar Giessen, Heft 208, 1992.

17

Feldman P. A practical scheme for non-interactive verifiable secret sharing // Proc. 28th Annu. Symp. on Found. of Comput. Sci. 1987. P. 427-437.

18

Rabin T., Ben-Or M. Verifiable secret sharing and multiparty protocols with honest majority // Proc. 21st Annu. ACM Symp. on Theory of Computing. 1989. P. 73-85.

19

Goldwasser S., Micali S. Probabilistic encryption // J. of Computer and System Sciences, V. 28, No 2, 1984. P. 270-299.

20

El Gamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms // IEEE Trans. Inf. Theory, IT-31, No 4, 1985. P. 469-472.

21

Chaum D., Pedersen T. P. Wallet databases with observers // Proc. Crypto'92, Lect. Notes in Comput. Sci., V. 740, 1993. P. 89-105.

22

Cramer R., Gennaro R., Schoenmakers B. A secure and optimally efficient multi-authority election scheme // Proc. EUROCRYPT'97, Lect. Notes in Comput. Sci., V. 1233, 1997. P. 103-118.

23

Cramer R., Franklin M., Schoenmakers B., Yung M. Multi-authority secret ballot elections with linear work // Proc. EUROCRYPT'96, Lect. Notes in Comput. Sci., V. 1070, 1996. P. 72-83.

24

Dolev D., Dwork C., Waarts O., Yung M. Perfectly secure message transmission // Proc. 31st Annu. Symp. on Found. of Comput. Sci. 1990. P. 36-45.

Next: 4. Алгоритмические проблемы теории

Up: Введение в криптографию

Previous: 3.8. Вместо заключения

Contents:




- Начало -  - Назад -  - Вперед -


[an error occurred while processing this directive]