-
1
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
[Bl]
-
[Bl] D. Beaver, Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority, Journal ofCiyptology, vol. 4 (1991), pp. 75-122
-
(1991)
Journal OfCiyptology
, vol.4
, pp. 75-122
-
-
Beaver, D.1
-
2
-
-
85029542707
-
Foundations of secure interactive computing
-
[B2] SpringerVerlag, Berlin
-
[B2] D. Beaver, Foundations of secure interactive computing, Proc. CRYPTO '91, LNCS 576, SpringerVerlag, Berlin, 1991, pp. 377-391.
-
(1991)
Proc. CRYPTO '91, LNCS 576
, pp. 377-391
-
-
Beaver, D.1
-
4
-
-
85048601848
-
Cryptographic protocols provably secure against dynamic adversaries
-
[BH] LNCS 658, Springer-Verlag, Berlin
-
[BH] D. Beaver and S. Haber, Cryptographic protocols provably secure against dynamic adversaries, Advances in Cryptology -Eurociypt '92, LNCS 658, Springer-Verlag, Berlin,1992, pp. 307-323.
-
(1992)
Advances in Cryptology -Eurociypt '92
, pp. 307-323
-
-
Beaver, D.1
Haber, S.2
-
5
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key-exchange protocols
-
[BCK] ACM
-
[BCK] M. Bellare, R. Canetti, and H. Krawczyk, A modular approach to the design and analysis of authentication and key-exchange protocols, Proc. 30th Symp. on Theory of Computing (STOC), ACM, 1998, pp. 419-428.
-
(1998)
Proc. 30th Symp. on Theory of Computing (STOC)
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
6
-
-
0027188428
-
Asynchronous secure computations
-
[BCG] ACM
-
[BCG] M. Ben-Or, R. Canetti, and O. Goldreich, Asynchronous secure computations, Proc. 25lh Symp. o Theory of Computing (STOC), ACM, 1993, pp. 52-61
-
(1993)
Proc. 25lh Symp. O Theory of Computing (STOC)
, pp. 52-61
-
-
Ben-Or, M.1
Canetti, R.2
Goldreich, O.3
-
7
-
-
84898960610
-
Completeness theorems for non-cryptographic faulttolerant distributed computation
-
[BGW]
-
[BGW] M. Ben-Or, S. Goldwasser, and A. Wigderson, Completeness theorems for non-cryptographic faulttolerant distributed computation, Proc. 20th Symp. on Theory of Computing (STOC), ACM, 1988, pp. 1-10.
-
(1988)
Proc. 20th Symp. on Theory of Computing (STOC), ACM
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
8
-
-
0006620177
-
-
[C] Ph.D. Thesis, Weizman Institute, Rehovot, Israel
-
[C] R. Canetti, Studies in Secure Multi-Party Computation and Applications, Ph.D. Thesis, Weizman Institute, Rehovot, Israel, 1995.
-
(1995)
Studies in Secure Multi-Party Computation and Applications
-
-
Canetti, R.1
-
9
-
-
84937402341
-
Adaptively secure computation
-
[CFGN] Fuller version in MIT-LCS-TR #682,1996.
-
[CFGN] R. Canetti, U. Feige, O. Goldreich, and M. Naor, Adaptively secure computation, Proc. 28//1 Symp on Theory of Computing (STOC), ACM, 1996. Fuller version in MIT-LCS-TR #682,1996.
-
(1996)
Proc. 28//1 Symp on Theory of Computing (STOC), ACM
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
10
-
-
84984842401
-
Maintaining security in the presence of transient faults
-
[CH] Springer-Verlag, Berlin
-
[CH] R. Canetti and A. Herzberg, Maintaining security in the presence of transient faults, Proc. CRYPT '94, LNCS 839, Springer-Verlag, Berlin, 1994, pp. 425-436.
-
(1994)
Proc. CRYPT '94, LNCS 839
, pp. 425-436
-
-
Canetti, R.1
Herzberg, A.2
-
12
-
-
0013001552
-
Proactive security: Long-term protection agains break-ins
-
[CGHN]
-
[CGHN] R. Canetti, R. Gennaro, A. Herzberg, and D. Naor, Proactive security: long-term protection agains break-ins, CryptoBytes, vol. 3, no. 1 (1997), 1-8
-
(1997)
CryptoBytes
, vol.3
, Issue.1
, pp. 1-8
-
-
Canetti, R.1
Gennaro, R.2
Herzberg, A.3
Naor, D.4
-
13
-
-
0005033406
-
A threshold cryptosystem secure against adaptive chosen ciphertext attacks
-
[CG2] Springer-Verlag, Berlin, Fuller version available on-line at http://philby.ucsd.edu
-
[CG2] R. Canetti and S. Goldwasser, A threshold cryptosystem secure against adaptive chosen ciphertext attacks, Proc. Eurociypt 99, Springer-Verlag, Berlin, 1999, pp. 90-103. Fuller version available on-line at http://philby.ucsd.edu
-
(1999)
Proc. Eurociypt 99
, pp. 90-103
-
-
Canetti, R.1
Goldwasser, S.2
-
14
-
-
0030652114
-
How to maintain authenticated communication, this issue. Preliminary version in
-
[CHH]
-
[CHH] R. Canetti, S. Halevi, and A. Herzberg, How to maintain authenticated communication, this issue. Preliminary version in Proc. I6lh Symp. on Principles of Distributed Computing (PODC), ACM, 1997, pp. 15-25
-
(1997)
Proc. I6lh Symp. on Principles of Distributed Computing (PODC), ACM
, pp. 15-25
-
-
Canetti, R.1
Halevi, S.2
Herzberg, A.3
-
15
-
-
0030652586
-
Randomness versus fault-tolerance, this issue. Preliminary version in
-
[CKOR]
-
[CKOR] R. Canetti, E. Kushilevitz, R. Ostrovsky, and A. Rosen, Randomness versus fault-tolerance, this issue. Preliminary version in Proc. \6th Symp. on Principles of Distributed Computing (PODC), ACM, 1997, pp. 35-45.
-
(1997)
Proc. 6th Symp. on Principles of Distributed Computing (PODC), ACM
, pp. 35-45
-
-
Canetti, R.1
Kushilevitz, E.2
Ostrovsky, R.3
Rosen, A.4
-
16
-
-
0032687056
-
Secure computation with honest-looking parties: What if nobody i truly honest?
-
[CO]
-
[CO] R. Canetti and R. Ostrovsky, Secure computation with honest-looking parties: what if nobody i truly honest?, Proc. 3laSymp. on Theory of Computing (STOC), ACM, 1999, pp. 255-264.
-
(1999)
Proc. 3laSymp. on Theory of Computing (STOC), ACM
, pp. 255-264
-
-
Canetti, R.1
Ostrovsky, R.2
-
17
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
[CCD]
-
[CCD] D. Chaum, C. Crepeau, and I. Damgard, Multiparty unconditionally secure protocols, Proc. 20t Symp. on the Theory of Computing (STOQ, ACM, 1988, pp. 11-19
-
(1988)
Proc. 20t Symp. on the Theory of Computing STOQ, ACM
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
21
-
-
85023809951
-
Threshold cryptosystems, in G. Brassard, editor
-
[DF] Springer-Verlag, Berlin
-
[DF] Y. Desmedt and Y. Frankel, Threshold cryptosystems, in G. Brassard, editor, Advances in Cryptolog - Crypto '89, LNCS No. 435, Springer-Verlag, Berlin, 1989, pp. 307-315.
-
(1989)
Advances in Cryptolog - Crypto '89, LNCS
, Issue.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
22
-
-
1542593353
-
Authentication and authenticated key exchanges
-
[DOW]
-
[DOW] W. Diffie, P. van Oorschot and M. Wiener, Authentication and authenticated key exchanges, Designs Codes and Cryptography, vol. 2 (1992), pp. 107-125
-
(1992)
Designs Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
23
-
-
0343337504
-
Non-malleable cryptography
-
[DDN]
-
[DDN] D. Dolev, C. Dwork, and M. Naor, Non-malleable cryptography, SIAM Journal on Computing, to appear. Preliminary version in Proc. 23rd Symposium on Tlieory of Computing (STOC), ACM, 1991.
-
(1991)
SIAM Journal on Computing, to Appear. Preliminary Version in Proc. 23rd Symposium on Tlieory of Computing (STOC), ACM
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
25
-
-
84976655650
-
Cryptographic computation: Secure faut-tolerant protocols and th public-key model
-
[GHY] Springer-Verlag, Berlin
-
[GHY] Z. Galil, S. Haber, and M. Yung, Cryptographic computation: secure faut-tolerant protocols and th public-key model, Proc. CRYPTO '87, LNCS 293, Springer-Verlag, Berlin, 1988, pp. 135-155.
-
(1988)
Proc. CRYPTO '87, LNCS 293
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
26
-
-
84947926543
-
Robust threshold DSS signatures
-
[GJKR] Springer-Verlag, verlin
-
[GJKR] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Robust threshold DSS signatures, Proc. Eurocrypt '96, LNCS 1070, Springer-Verlag, verlin, 1996, pp. 354-371
-
(1996)
Proc. Eurocrypt '96, LNCS 1070
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
27
-
-
0027306732
-
A uniform complexity treatment of encryption and zero-knowledge
-
[Gl]
-
[Gl] O. Goldreich, A uniform complexity treatment of encryption and zero-knowledge. Journal of Cryptology, vol. 6, no. 1 (1993), pp. 21-53.
-
(1993)
Journal of Cryptology
, vol.6
, Issue.1
, pp. 21-53
-
-
Goldreich, O.1
-
28
-
-
0003868277
-
-
[G2] Weizmann Institute of Science Rehovot, Israel, Avaliable at http://philby.ucsd.edu.
-
[G2] O. Goldreich, Foundations of Cryptography (Fragment's of a Book), Weizmann Institute of Science Rehovot, Israel, 1995. (Avaliable at http://philby.ucsd.edu.
-
(1995)
Foundations of Cryptography (Fragment's of A Book)
-
-
Goldreich, O.1
-
30
-
-
0029767165
-
On the composition of zero-knowledge proof systems
-
[GK]
-
[GK] O. Goldreich and H. Krawczyk, On the composition of zero-knowledge proof systems, SIAM Journa on Computing, vol. 25, no. 1 (1996)
-
(1996)
SIAM Journa on Computing
, vol.25
, Issue.1
-
-
Goldreich, O.1
Krawczyk, H.2
-
31
-
-
71149116146
-
Proofs that yield nothing but their validity or all language in NP have zero-knowledge proof systems
-
[GMW1]
-
[GMW1] O. Goldreich, S. Micali, and A. Wigderson, Proofs that yield nothing but their validity or all language in NP have zero-knowledge proof systems, Journal of the ACM, vol. 38, no. 1 (1991), pp. 691-729
-
(1991)
Journal of the ACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
33
-
-
0023545076
-
How to play any mental game
-
[GMW2]
-
[GMW2] O. Goldreich, S. Micali, and A. Wigderson, How to play any mental game, Proc. 19th Symp. o Theory of Computing (STOC), ACM, 1987, pp. 218-229
-
(1987)
Proc. 19th Symp. O Theory of Computing (STOC), ACM
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
34
-
-
0028676264
-
Definitions and properties of zero-knowledge proof systems
-
[GO]
-
[GO] O. Goldreich and Y. Oren, Definitions and properties of zero-knowledge proof systems, Journal of Cryptology, vol. 7, no. 1 (1994), pp. 1-32.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.1
, pp. 1-32
-
-
Goldreich, O.1
Oren, Y.2
-
36
-
-
0012527958
-
Fair computation of general functions in presence of immoral majority
-
[GL] Springer-Verlag, Berlin
-
[GL] S. Goldwasser and L. Levin, Fair computation of general functions in presence of immoral majority Proc. CRYPTO '90, LNCS 537, Springer-Verlag, Berlin, 1990.
-
(1990)
Proc. CRYPTO '90, LNCS 537
-
-
Goldwasser, S.1
Levin, L.2
-
38
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
[GMR]
-
[GMR] S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof systems SIAM Journal on Computing, vol. 18, no. 1 (1989), pp. 186-208
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
39
-
-
0030693496
-
Complete characterization of adversaries tolerable in secure multiparty computation, this issue. Preliminary version in
-
[HM]
-
[HM] M. Hirt and U. Maurer, Complete characterization of adversaries tolerable in secure multiparty computation, this issue. Preliminary version in Proc. 16th Symp. on Principles of Distributed Computing (PODC), ACM, 1997, pp. 25-34
-
(1997)
Proc. 16th Symp. on Principles of Distributed Computing (PODC), ACM
, pp. 25-34
-
-
Hirt, M.1
Maurer, U.2
-
40
-
-
0033725451
-
Reducibility and completeness in private computations
-
[KKMO]
-
[KKMO] J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky, Reducibility and completeness in private computations, SIAM Journal of Computing,
-
SIAM Journal of Computing
-
-
Kilian, J.1
Kushilevitz, E.2
Micali, S.3
Ostrovsky, R.4
-
43
-
-
0002365530
-
Privacy and communication complexity
-
[K]
-
[K] E. Kushilevitz, Privacy and communication complexity, SIAM Journal on Discrete Mathematics, vol. 5, no. 2 (1992), pp. 273-284.
-
(1992)
SIAM Journal on Discrete Mathematics
, vol.5
, Issue.2
, pp. 273-284
-
-
Kushilevitz, E.1
-
45
-
-
0002187139
-
Secure computation, Unpublished manuscript, 1992. Preliminary versio in
-
[MR] Springer-Verlag, Berlin
-
[MR] S. Micali and P. Rogaway, Secure computation, Unpublished manuscript, 1992. Preliminary versio in Proc. CRYPTO '91, LNCS 576, Springer-Verlag, Berlin, 1991, pp. 392-4104.
-
(1991)
Proc. CRYPTO '91, LNCS 576
, pp. 392-4104
-
-
Micali, S.1
Rogaway, P.2
-
48
-
-
84957689308
-
A simplified approach to threshold and proactive RSA
-
[R] LNCS Springer-Verlag, Berlin
-
[R] T. Rabin, A simplified approach to threshold and proactive RSA, Proc. CRYPTO '98, LNCS Springer-Verlag, Berlin, 1998, pp. 89-102
-
(1998)
Proc. CRYPTO '98
, pp. 89-102
-
-
Rabin, T.1
-
51
-
-
0020301290
-
Theory and applications of trapdoor functions
-
[ Y2] A. Yao, Theory and applications of trapdoor functions, Proc. 23rd Symp. on Foundations of Compute Science (FOCS), IEEE, 1982, pp. 80-91.
-
(1982)
Proc.
, vol.23
, pp. 80-91
-
-
Yao, A.1
-
52
-
-
0022882770
-
How to generate and exchange secrets
-
[Y3]
-
[Y3] A. Yao, How to generate and exchange secrets, Proc. 21th Symp. on Foundations of Compute Science (FOCS), IEEE, 1986, pp. 162-167.
-
(1986)
Proc.
, vol.21
, pp. 162-167
-
-
Yao, A.1
|