1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
|
@inproceedings{Pedersen,
author = {Pedersen, Torben Pryds},
title = {A threshold cryptosystem without a trusted party},
booktitle = {Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques},
series = {EUROCRYPT'91},
year = {1991},
isbn = {3-540-54620-0},
location = {Brighton, UK},
pages = {522--526},
numpages = {5},
url = {http://dl.acm.org/citation.cfm?id=1754868.1754929},
acmid = {1754929},
publisher = {Springer-Verlag},
address = {Berlin, Heidelberg},
}
@inproceedings{Cramer97,
author = {Cramer, Ronald and Gennaro, Rosario and Schoenmakers, Berry},
title = {A secure and optimally efficient multi-authority election scheme},
booktitle = {Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques},
series = {EUROCRYPT'97},
year = {1997},
isbn = {3-540-62975-0},
location = {Konstanz, Germany},
pages = {103--118},
numpages = {16},
url = {http://dl.acm.org/citation.cfm?id=1754542.1754554},
acmid = {1754554},
publisher = {Springer-Verlag},
address = {Berlin, Heidelberg},
}
@inproceedings{Cramer94,
author = {Cramer, Ronald and Damg{\aa}rd, Ivan and Schoenmakers, Berry},
title = {Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols},
booktitle = {Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology},
series = {CRYPTO '94},
year = {1994},
isbn = {3-540-58333-5},
pages = {174--187},
numpages = {14},
url = {http://dl.acm.org/citation.cfm?id=646759.705842},
acmid = {705842},
publisher = {Springer-Verlag},
address = {London, UK, UK},
}
@article{shamir1979share,
title={How to share a secret},
author={Shamir, Adi},
journal={Communications of the ACM},
volume={22},
number={11},
pages={612--613},
year={1979},
publisher={ACM}
}
@incollection {ddh,
author = {Boneh, Dan},
affiliation = {Stanford University Computer Science Department 94305-9045 Stanford CA 94305-9045 Stanford CA},
title = {The Decision Diffie-Hellman problem},
booktitle = {Algorithmic Number Theory},
series = {Lecture Notes in Computer Science},
editor = {Buhler, Joe},
publisher = {Springer Berlin / Heidelberg},
isbn = {978-3-540-64657-0},
keyword = {Computer Science},
pages = {48-63},
volume = {1423},
url = {http://dx.doi.org/10.1007/BFb0054851},
note = {10.1007/BFb0054851},
year = {1998}
}
@book{hac,
author = {Menezes, Alfred J. and Vanstone, Scott A. and Oorschot, Paul C. Van},
title = {Handbook of Applied Cryptography},
year = {1996},
isbn = {0849385237},
edition = {1st},
publisher = {CRC Press, Inc.},
address = {Boca Raton, FL, USA},
}
@book{algebra,
author = {Judson, T. W.},
citeulike-article-id = {3080999},
keywords = {bibliografia, review},
posted-at = {2008-08-04 14:16:24},
priority = {2},
publisher = {PWS Pub. Co.},
title = {{Abstract Algebra: Theory and Applications}},
year = {1994}
}
|