-
1
-
-
84990678058
-
Simple Constructions of Almost Jt-Wise Independent Random Variables, FOCS 90 and
-
[AGHP] Addendum: Vol. 4,1993, pp. 119-120
-
[AGHP] N. Alon, O. Goldreich, J. Hastad, and R. Peralta, Simple Constructions of Almost Jt-Wise Independent Random Variables, FOCS 90 and Random Structures Algorithms, Vol. 3, 1992, pp. 289-304. (Addendum: Vol. 4,1993, pp. 119-120)
-
(1992)
Random Structures Algorithms
, vol.3
, pp. 289-304
-
-
Alon, N.1
Goldreich, O.2
Hastad, J.3
Peralta, R.4
-
3
-
-
0002382799
-
Foundations of Secure Interactive Computing
-
[B2]
-
[B2] D. Beaver, Foundations of Secure Interactive Computing, Proc. CRYPTO, 1991, pp. 377-391.
-
(1991)
Proc. CRYPTO
, pp. 377-391
-
-
Beaver, D.1
-
4
-
-
33746365751
-
Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Fault Minority, J
-
[B3]
-
[B3] D. Beaver, Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Fault Minority, J. Cryptology, Vol. 4, 1991, pp. 75-122.
-
(1991)
Cryptology
, vol.4
, pp. 75-122
-
-
Beaver, D.1
-
5
-
-
0024940038
-
Non-Cryptographic Fault-Tolerant Computing in a Constant Number o Rounds
-
[BB]
-
[BB] J. Bar-IIan and D. Beaver, Non-Cryptographic Fault-Tolerant Computing in a Constant Number o Rounds, Proc. Sth PODC, 1989, pp. 201-209.
-
(1989)
Proc. Sth PODC
, pp. 201-209
-
-
Bar-Han, J.1
Beaver, D.2
-
7
-
-
84958034013
-
On the Number of Random Bits in Totall Private Computations
-
BDPV Springer-Verlag, Berlin
-
[BDPVJ C. Blundo, A. De-Santis, G. Persiano, and U. Vaccaro, On the Number of Random Bits in Totall Private Computations, Proc. ICALP, LNCS 944, Springer-Verlag, Berlin, 1995, pp. 171-182.
-
(1995)
Proc. ICALP, LNCS
, vol.944
, pp. 171-182
-
-
Blundo, J.C.1
De-Santis, A.2
Persiano, G.3
Vaccaro, U.4
-
8
-
-
85027395928
-
Randomness in Distribution Protocols
-
[BDV] Springer-Verlag, Berlin
-
[BDV] C. Blundo, A. De-Santis, and U. Vaccaro, Randomness in Distribution Protocols, Proc. ICALP LNCS 820, Springer-Verlag, Berlin, 1994, pp. 568-579.
-
(1994)
Proc. ICALP LNCS 820
, pp. 568-579
-
-
Blundo, C.1
De-Santis, A.2
Vaccaro, U.3
-
10
-
-
0013546220
-
On the Dealer's Randomness Required in Secret Sharing Schemes
-
[BGS]
-
[BGS] C. Blundo, A. Giorgio Gaggia, and D. R. Stinson, On the Dealer's Randomness Required in Secret Sharing Schemes, EuroCrypt94 and Designs Codes Cryptography, Vol. 11, No. 2,1997, pp. 235- 259
-
(1997)
EuroCrypt94 and Designs Codes Cryptography
, vol.11
, Issue.2
, pp. 235-259
-
-
Blundo, C.1
Giorgio Gaggia, A.2
Stinson, D.R.3
-
11
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
[BOW]
-
[BOW] M. Ben-or, S. Goldwasser, and A. Wigderson, Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation, Proc. STOC, 1988, pp. 1-10.
-
Proc. STOC
, vol.1988
, pp. 1-10
-
-
Ben-or, M.1
Goldwasser, S.2
Wigderson, A.3
-
12
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences of Pseudo-Rando Bits, FOCS 82 and
-
[BM]
-
[BM] M. Blum and S. Micali, How to Generate Cryptographically Strong Sequences of Pseudo-Rando Bits, FOCS 82 and SIAMJ. Comput., Vol. 13,1984, pp. 850-864
-
(1984)
SIAMJ. Comput.
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
13
-
-
0006620177
-
-
[Cl] Ph.D. Thesis, Departmen of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, June
-
[Cl] R. Canetti, Studies in Secure Multi-Party Computation and Applications, Ph.D. Thesis, Departmen of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, June 1995
-
(1995)
Studies in Secure Multi-Party Computation and Applications
-
-
Canetti, R.1
-
14
-
-
84878910145
-
Security and Composition of Multiparty Cryptographic Protocols
-
[C2]
-
[C2] R. Canetti, Security and Composition of Multiparty Cryptographic Protocols, J. Cryptology, thi issue.
-
J. Cryptology
, Issue.THI ISSUE
-
-
Canetti, R.1
-
15
-
-
84898947315
-
Multiparty Unconditionally Secure Protocols
-
[CCD]
-
[CCD] D. Chaum, C. Crepeau, and I. Damgard, Multiparty Unconditionally Secure Protocols, Proc. STOC 1988, pp. 11-19.
-
(1988)
Proc. STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
16
-
-
0012242251
-
Randomization in Byzantine Agreement
-
[CD]
-
[CD] B. Chor and C. Dwork, Randomization in Byzantine Agreement, Adv. Comput. Res., Vol. 5,1989 pp. 443-4197.
-
(1989)
Adv. Comput. Res.
, vol.5
, pp. 443-4197
-
-
Chor, B.1
Dwork, C.2
-
17
-
-
0029723583
-
Adaptively Secure Multi-Party Computation
-
[CFGN]
-
[CFGN] R. Canetti, U. Feige, O. Goldreich, and M. Naor, Adaptively Secure Multi-Party Computation, Proc 2Sih STOC, 1996, pp. 639-648.
-
(1996)
Proc 2Sih STOC
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
18
-
-
0023985259
-
Unbiased Bits from Sources of Weak Randomness and Probabilisti Communication Complexity, FOCS 85 and
-
[CG1]
-
[CG1] B. Chor and O. Goldreich, Unbiased Bits from Sources of Weak Randomness and Probabilisti Communication Complexity, FOCS 85 and SICOMP, Vol. 17,1988, pp. 230-261.
-
(1988)
SICOMP
, vol.17
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
19
-
-
0040655145
-
Bounds on Tradeoffs between Randomness and Communicatio Complexity, FOCS 90 and
-
[CG2]
-
[CG2] R. Canetti and O. Goldreich, Bounds on Tradeoffs between Randomness and Communicatio Complexity, FOCS 90 and Comput. Complexity, Vol. 3,1993, pp. 141-167.
-
(1993)
Comput. Complexity
, vol.3
, pp. 141-167
-
-
Canetti, R.1
Goldreich, O.2
-
20
-
-
0022199386
-
Verifiable Secret Sharing and Achievin Simultaneity in the Presence of Faults
-
[COMA]
-
[COMA] B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, Verifiable Secret Sharing and Achievin Simultaneity in the Presence of Faults, Proc. FO'CS, 1985, pp. 383-395.
-
(1985)
Proc. FO'CS
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
21
-
-
0002738457
-
A Zero-One Law for Boolean Privacy, STOC 89 and
-
[CK1]
-
[CK1] B. Chor and E. Kushilevitz, A Zero-One Law for Boolean Privacy, STOC 89 and SIDMA, Vol. 4 1991, pp. 36-47.
-
(1991)
SIDMA
, vol.4
, pp. 36-47
-
-
Chor, B.1
Kushilevitz, E.2
-
22
-
-
0040655149
-
A Communication-Privacy Tradeoff for Modular Addition
-
[CK2]
-
[CK2] B. Chor and E. Kushilevitz, A Communication-Privacy Tradeoff for Modular Addition, Inform Process. Lett., Vol. 45, 1993, pp. 205-210.
-
(1993)
Inform Process. Lett.
, vol.45
, pp. 205-210
-
-
Chor, B.1
Kushilevitz, E.2
-
23
-
-
0027227135
-
Randomness-Optimal Unique Element Isolation, wit Application to Perfect Matching and Related Problems
-
[CRS]
-
[CRS] S. Chari, P. Rohatgi, and A. Srinivasan, Randomness-Optimal Unique Element Isolation, wit Application to Perfect Matching and Related Problems, Proc. STOC, 1993, pp. 458-467.
-
(1993)
Proc. STOC
, pp. 458-467
-
-
Chari, S.1
Rohatgi, P.2
Srinivasan, A.3
-
24
-
-
0027986369
-
A Minimal Model for Secure Computation
-
[FKN]
-
[FKN] U. Feige, J. Kilian, and M. Naor, A Minimal Model for Secure Computation, Proc. STOC, 1994 pp. 554-563. .,
-
(1994)
Proc. STOC
, pp. 554-563
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
25
-
-
0000613943
-
A Lower Bound for the Time to Assure Interactive Consistency
-
[FL]
-
[FL] M. Fischer and N. Lynch, A Lower Bound for the Time to Assure Interactive Consistency, IPL Vol. 14, No. 4,1982, pp. 183-186.
-
(1982)
IPL
, vol.14
, Issue.4
, pp. 183-186
-
-
Fischer, M.1
Lynch, N.2
-
26
-
-
0022045868
-
Impossibility of Distributed Consensus with on Faulty Process
-
[FLP]
-
[FLP] M. J. Fischer, N. A. Lynch, and M. S. Paterson, Impossibility of Distributed Consensus with On Faulty Process, J. Assoc. Comput. Mach., Vol. 32, No. 2,1985, pp. 374-382.
-
(1985)
J. Assoc. Comput. Mach.
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Paterson, M.S.3
-
27
-
-
0031210863
-
An Optimal Algorithm for Synchronous Byzantine Agreement, STO 88 and
-
[FM]
-
[FM] P. Feldman and S. Micali, An Optimal Algorithm for Synchronous Byzantine Agreement, STO 88 and SIAM J. Comput., Vol. 26, No. 4,1997, pp. 873-933.
-
(1997)
SIAM J. Comput.
, vol.26
, Issue.4
, pp. 873-933
-
-
Feldman, P.1
Micali, S.2
-
28
-
-
0026985378
-
Communication Complexity of Secure Computation
-
[FY]
-
[FY] M. Franklin, and M. Yung, Communication Complexity of Secure Computation, Proc. STOC, 1992 pp. 699-710.
-
(1992)
Proc. STOC
, pp. 699-710
-
-
Franklin, M.1
Yung, M.2
-
31
-
-
0012527958
-
Fair Computation of General Functions in Presence of Immora Majority
-
[GL]
-
[GL] S. Goldwasser and L. Levin, Fair Computation of General Functions in Presence of Immora Majority, Proc. CRYPTO, 1990.
-
(1990)
Proc. CRYPTO
-
-
Goldwasser, S.1
Levin, L.2
-
32
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof Systems
-
[GMR]
-
[GMR] S. Goldwasser, S. Micali, and C. Rackoff, The Knowledge Complexity of Interactive Proof Systems SIAMJ. Comput., Vol. 18, No. 1,1989, pp. 186-208
-
(1989)
SIAMJ. Comput.
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
33
-
-
33745976130
-
On the Cunning Power of Cheating Verifiers: Some Observations abou Zero-Knowledge Proofs, in preparation. Preliminary version by Y. Oren in
-
[GO]
-
[GO] O. Goldreich and Y. Oren, On the Cunning Power of Cheating Verifiers: Some Observations abou Zero-Knowledge Proofs, in preparation. Preliminary version by Y. Oren in Proc. 28;/i FOCS, 1987
-
(1987)
Proc. 28;/i FOCS
-
-
Goldreich, O.1
Oren, Y.2
-
34
-
-
0031628398
-
Simplified VSS and Fact-Track Multiparty Computations wit Applications to Threshold Cryptography
-
[GRR]
-
[GRR] R. Gennaro, T. Rabin, and M. Rabin, Simplified VSS and Fact-Track Multiparty Computations wit Applications to Threshold Cryptography, Proc. PODC, 1998, pp. 101-111.
-
Proc. PODC
, vol.1998
, pp. 101-111
-
-
Gennaro, R.1
Rabin, T.2
Rabin, M.3
-
35
-
-
84969331532
-
Pseudo-Random Generators under Uniform Assumptions
-
[H]
-
[H] J. Hastad, Pseudo-Random Generators under Uniform Assumptions, Proc. STOC 90.
-
Proc. STOC 90.
-
-
Hastad, J.1
-
36
-
-
85029616064
-
Pseudo-Random Generation from One-Way Functions Proc
-
[ILL]
-
[ILL] R. Impagliazzo, R., L. Levin, and M. Luby, Pseudo-Random Generation from One-Way Functions Proc. STOC 89.
-
STOC 89.
-
-
Impagliazzo, R.1
Levin, L.2
Luby, M.3
-
38
-
-
0002365530
-
Privacy and Communication Complexity, FOCS 89, and
-
[K]
-
[K] E. Kushilevitz, Privacy and Communication Complexity, FOCS 89, and SIAM J. Discrete Math. Vol. 5, No. 2,1992, pp. 273-284
-
(1992)
SIAM J. Discrete Math.
, vol.5
, Issue.2
, pp. 273-284
-
-
Kushilevitz, E.1
-
39
-
-
0031339396
-
(De)randomized Construction of Small Sample Spaces in NC
-
[KK]
-
[KK] D. Karger and D. Koller, (De)randomized Construction of Small Sample Spaces in NC, FOCS 94 and J. Comput. System Sci., Vol. 55, No. 3,1997, pp. 402-413.
-
(1997)
FOCS 94 and J. Comput. System Sci.
, vol.55
, Issue.3
, pp. 402-413
-
-
Karger, D.1
Koller, D.2
-
40
-
-
0000062463
-
Constructing Small Sample Spaces Satisfying Given Constraints, STO 93 and
-
[KM1]
-
[KM1] D. Koller and N. Megiddo, Constructing Small Sample Spaces Satisfying Given Constraints, STO 93 and SIAM J. Discrete Math., Vol. 7, No. 2,1994, pp. 260-274
-
(1994)
SIAM J. Discrete Math.
, vol.7
, Issue.2
, pp. 260-274
-
-
Koller, D.1
Megiddo, N.2
-
41
-
-
0028060850
-
Derandomization through Approximation: An WC Algorithm for Minimum Cuts
-
[KM2]
-
[KM2] D. Karger and R. Motwani, Derandomization through Approximation: An WC Algorithm for Minimum Cuts, Proc. 26th STOC, 1994, pp. 497-506
-
(1994)
Proc. 26th STOC
, pp. 497-506
-
-
Karger, D.1
Motwani, R.2
-
42
-
-
0031459086
-
-
[KM3]
-
[KM3] H. Karloff and Y. Mansour, On Construction of it-wise Independent Random Variables, STOC 94 and Combinatorial, Vol. 17, No. 1,1997, pp. 91-107
-
(1997)
Combinatorial
, vol.17
, Issue.1
, pp. 91-107
-
-
Karloff, H.1
Mansour, Y.2
Variables, O.C.3
-
43
-
-
0011180890
-
-
[KM4]
-
[KM4] E. Kushilevitz and Y. Mansour, Randomness in Private Computations, PODC 1996 and SIAM J. Discrete Math., Vol. 10, No. 4,1997, pp. 647-661
-
(1997)
SIAM J. Discrete Math.
, vol.10
, Issue.4
, pp. 647-661
-
-
Kushilevitz, E.1
Mansour, Y.2
Computations, R.I.P.3
-
44
-
-
0038647741
-
-
[KMO]
-
[KMO] E. Kushilevitz, S. Micali, and R. Ostrovsky, Reducibility and Completeness in Multi-Party Privat Computations, Proc. 35th FOCS, 1994, pp. 478-4189.
-
(1994)
Proc.
, vol.35
, pp. 478-4189
-
-
Kushilevitz, E.1
Micali, S.2
Ostrovsky, R.3
Reducibility4
Computations, C.I.5
-
45
-
-
0033075133
-
-
[KOR1]
-
[KOR1] E. Kushilevitz, R. Ostrovsky, and A. Rosén, Characterizing Linear Size Circuits in Terms of Privacy STOC 96 and J. Comput. System Sci., Vol. 58,1999, pp. 129-136
-
(1999)
J. Comput. System Sci.
, vol.58
, pp. 129-136
-
-
Kushilevitz, E.1
Ostrovsky, R.2
Rosén, A.3
-
46
-
-
0031632430
-
-
[KOR2]
-
[KOR2] E. Kushilevitz, R. Ostrovsky, and A. Rosén, Amortizing Randomness in Private Multiparty Computations, Proc. 17th PODC, 1998, pp. 81-90
-
(1998)
Proc.
, vol.17
, pp. 81-90
-
-
Kushilevitz, E.1
Ostrovsky, R.2
Rosén, A.3
Computations, A.R.4
-
47
-
-
84894203891
-
A Time-Randomness Tradeoff for Oblivious Routing
-
[KPU]
-
[KPU] D. Krizanc, D. Peleg, and E. Upfal, A Time-Randomness Tradeoff for Oblivious Routing, Proc STOC, 1988, pp. 93-102.
-
(1988)
Proc STOC
, pp. 93-102
-
-
Krizanc, D.1
Peleg, D.2
Upfal, E.3
-
48
-
-
0011217520
-
A Randomness-Rounds Tradeoff in Private Computation, CRYPT 94 and
-
[KR]
-
[KR] E. Kushilevitz and A. Rosén, A Randomness-Rounds Tradeoff in Private Computation, CRYPT 94 and SIAMJ. Discrete Math., Vol. 11, No. 1, 1998, pp. 61-80.
-
(1998)
SIAMJ. Discrete Math.
, vol.11
, Issue.1
, pp. 61-80
-
-
Kushilevitz, E.1
Rosén, A.2
-
49
-
-
0002918554
-
The Complexity of Non-Uniform Random Number Generation, i
-
[KY] ed. J. Traub
-
[KY] D. E. Knuth and A. C. Yao, The Complexity of Non-Uniform Random Number Generation, I Algorithms and Complexity, ed. J. Traub, 1976, pp. 357-428.
-
(1976)
Algorithms and Complexity
, pp. 357-428
-
-
Knuth, D.E.1
Yao, A.C.2
-
51
-
-
0002187139
-
Secure Computation, manuscript, 1992 (updated version, 1998). Preliminary version in
-
[MR]
-
[MR] S. Micali and P. Rogaway, Secure Computation, manuscript, 1992 (updated version, 1998). Preliminary version in P we. CRYPTO 91, pp. 392-4104.
-
P We. CRYPTO 91
, pp. 392-4104
-
-
Micali, S.1
Rogaway, P.2
-
52
-
-
0025152619
-
Pseudorandom Generator for Space Bounded Computation
-
[N]
-
[N] N. Nisan, Pseudorandom Generator for Space Bounded Computation, Proc. 22nd STOC, 1990 pp. 204-212.
-
(1990)
Proc. 22nd STOC
, pp. 204-212
-
-
Nisan, N.1
-
53
-
-
0027641832
-
Small-Bias Probability Spaces: Efficient Constructions and Applications STOC 90 and
-
[NN]
-
[NN] J. Naor and M. Naor, Small-Bias Probability Spaces: Efficient Constructions and Applications STOC 90 and SIAM J. Comput., Vol. 22, No. 4,1993, pp. 838-856.
-
(1993)
SIAM J. Comput.
, vol.22
, Issue.4
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
54
-
-
0024859552
-
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
-
[RB]
-
[RB] T. Rabin and M. Ben-Or, Verifiable Secret Sharing and Multiparty Protocols with Honest Majority Proc. 2lst STOC, 1989, pp. 73-85.
-
(1989)
Proc. 2lst STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
55
-
-
85029615997
-
Memory vs. Randomization in On-Line Algorithms
-
[RS]
-
[RS] P. Raghavan and M. Snir, Memory vs. Randomization in On-Line Algorithms, Proc. ICALP, 1989 pp. 687-703
-
(1989)
Proc. ICALP
, pp. 687-703
-
-
Raghavan, P.1
Snir, M.2
-
56
-
-
0018545449
-
How to Share a Secret
-
[SI]
-
[SI] A. Shamir, How to Share a Secret, Comm. ACM, Vol. 22,1979, pp. 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
57
-
-
0026977180
-
Sample Spaces Uniform on Neighborhoods
-
[S2]
-
[S2] L. J. Schulman, Sample Spaces Uniform on Neighborhoods, Proc. 24th STOC, 1992, pp. 17-25.
-
(1992)
Proc. 24th STOC
, pp. 17-25
-
-
Schulman, L.J.1
-
60
-
-
0020301290
-
Theory and Applications of Trapdoor Functions
-
[Yl]
-
[Yl] A. C. Yao, Theory and Applications of Trapdoor Functions, Proc. 23rd FOCS, 1982, pp. 80-91.
-
(1982)
Proc. 23rd FOCS
, pp. 80-91
-
-
Yao, A.C.1
-
61
-
-
0020312165
-
Protocols for Secure Computation
-
[Y2]
-
[Y2] A. Yao, Protocols for Secure Computation, Proc. 23rd FOCS, 1982, pp. 160-164.
-
(1982)
Proc. 23rd FOCS
, pp. 160-164
-
-
Yao, A.1
-
62
-
-
0001023343
-
Simulating BPP Using a General Weak Random Source, FOCS 91
-
[Z]
-
[Z] D. Zuckerman, Simulating BPP Using a General Weak Random Source, FOCS 91 zndAlgorithinica, Vol. 16,1996, pp. 367-391.
-
(1996)
ZndAlgorithinica
, vol.16
, pp. 367-391
-
-
Zuckerman, D.1
|