De Santis, Alfredo; Desmedt, Yvo; Frankel, Yair; Yung, Moti How to share a function securely. (English) Zbl 1345.94094 Proceedings of the 26th annual ACM symposium on theory of computing, STOC ’94, Montreal, Canada, May 23–25, 1994. New York, NY: Association for Computing Machinery (ACM) (ISBN 0-89791-663-8). 522-533 (1994). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{A. De Santis} et al., in: Proceedings of the 26th annual ACM symposium on theory of computing, STOC '94, Montreal, Canada, May 23--25, 1994. New York, NY: Association for Computing Machinery (ACM). 522--533 (1994; Zbl 1345.94094) Full Text: DOI
Desmedt, Yvo; Yung, Moti Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter’s attacks. (Extended abstract). (English) Zbl 0800.68419 Menezes, Alfred J. (ed.) et al., Advances in cryptology - CRYPTO ’90. A conference on the theory and application of cryptography, Univ. of California, Santa Barbara, USA, August 11-15, 1990. Proceedings. Berlin etc.: Springer-Verlag. Lect. Notes Comput. Sci. 537, 177-188 (1991). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{Y. Desmedt} and \textit{M. Yung}, Lect. Notes Comput. Sci. 537, 177--188 (1991; Zbl 0800.68419)
Desmedt, Yvo; Yung, Moti Weaknesses of undeniable signature schemes. (English) Zbl 0825.94197 Advances in Cryptology, Proc. Workshop, EUROCRYPT ’91, Brighton/UK 1991, Lect. Notes Comput. Sci. 547, 205-220 (1991). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. Desmedt} and \textit{M. Yung}, Lect. Notes Comput. Sci. 547, 205--220 (1991; Zbl 0825.94197) Full Text: DOI