-
1
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC '88, Chicago, IL, May 2-4), J. Simon, Chair. ACM Press, New York, NY
-
Ben-Or, M., Goldwasser, S., and Wigderson, A. 1988. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC '88, Chicago, IL, May 2-4), J. Simon, Chair. ACM Press, New York, NY, 1-10
-
(1988)
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
2
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
(Nov.)
-
Blum, M. and Micali, S. 1984. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput. 13, 4 (Nov.), 850-864
-
(1984)
SIAM J. Comput.
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
3
-
-
34247222154
-
Detection of disrupters in the DC protocol
-
(EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY
-
Bos, J. and Den Boer, B. 1990. Detection of disrupters in the DC protocol. In Proceedings of the Workshop on Advances in Cryptology (EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY, 320-327
-
(1990)
Proceedings of the Workshop on Advances in Cryptology
, pp. 320-327
-
-
Bos, J.1
Den Boer, B.2
-
4
-
-
0029723583
-
Adaptively secure multi-party computation
-
In Proceedings of the 28th Annual ACM Symposium on Theory of Computing (STOC '96, Philadelphia, PA, May 22-24), G. L. Miller, Chair. ACM Press, New York, NY
-
Canetti, R., Feige, U., Goldreich, O., and Naor, M. 1996. Adaptively secure multi-party computation. In Proceedings of the 28th Annual ACM Symposium on Theory of Computing (STOC '96, Philadelphia, PA, May 22-24), G. L. Miller, Chair. ACM Press, New York, NY, 639-648
-
(1996)
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
5
-
-
0030652586
-
-
Randomness vs. fault-tolerance. In Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing (PODC '97, Santa Barbara, CA, Aug. 21-24), J. E. Burns and H. Attiya, Chairs. ACM Press, New York, NY
-
Canetti, R., Kushilevitz, E., Ostrovsky, R., and Rosen, A. 1997. Randomness vs. fault-tolerance. In Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing (PODC '97, Santa Barbara, CA, Aug. 21-24), J. E. Burns and H. Attiya, Chairs. ACM Press, New York, NY, 35-44
-
(1997)
, pp. 35-44
-
-
Canetti, R.1
Kushilevitz, E.2
Ostrovsky, R.3
Rosen, A.4
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
(Feb.)
-
Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2 (Feb.), 84-88
-
(1981)
Commun. ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
7
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum, D. 1988. The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptology 1, 1, 65-75
-
(1988)
J. Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
8
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC '88, Chicago, IL, May 2-4), J. Simon, Chair. ACM Press, New York, NY
-
Chaum, D. and Damgard, I. 1988. Multiparty unconditionally secure protocols. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC '88, Chicago, IL, May 2-4), J. Simon, Chair. ACM Press, New York, NY, 11-19
-
(1988)
, pp. 11-19
-
-
Chaum, D.1
Damgard, I.2
-
9
-
-
0027805770
-
Eavesdropping games: A graph-theoretic approach to privacy in distributed systems
-
Press
-
Franklin, M., Galil, Z., and Yung, M. 1993. Eavesdropping games: A graph-theoretic approach to privacy in distributed systems. In Proceedings of the IEEE Symposium on Foundations of Computer Science (FOCS '93). IEEE Computer Society Press, Los Alamitos, CA
-
(1993)
Proceedings of the IEEE Symposium on Foundations of Computer Science (FOCS '93). IEEE Computer Society
-
-
Franklin, M.1
Galil, Z.2
Yung, M.3
-
10
-
-
0023545076
-
How to play ANY mental game
-
In Proceedings of the 19th Annual ACM Conference on Theory of Computing (STOC '87, New York, NY, May 25-27), A. V. Aho, Ed. ACM Press, New York, NY
-
Goldreich, O., Micali, S., and Wigderson, A. 1987. How to play ANY mental game. In Proceedings of the 19th Annual ACM Conference on Theory of Computing (STOC '87, New York, NY, May 25-27), A. V. Aho, Ed. ACM Press, New York, NY, 218-229
-
(1987)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
11
-
-
0345253860
-
Construction of a pseudorandom generator from any one-way function
-
Hastad, J., Impagliazzo, R., Levin, L. A., and Luby, M. 1999. Construction of a pseudorandom generator from any one-way function. SIAM J. Comput. 28, 4, 1364-1396
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
12
-
-
0003657590
-
The Art of Computer Programming
-
3rd ed. Addison-Wesley, Reading, MA
-
Knuth, D. E. 1997. The Art of Computer Programming. 3rd ed. Addison-Wesley, Reading, MA
-
(1997)
-
-
Knuth, D.E.1
-
13
-
-
84968329589
-
Reducibility and completeness in multi-party private computations
-
IEEE Computer Society Press, Los Alamitos, CA
-
Kushilevitz, E., Micali, S., and Ostrovsky, R. 1994. Reducibility and completeness in multi-party private computations. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science (Nov.). IEEE Computer Society Press, Los Alamitos, CA
-
(1994)
Proceedings of the 35th Annual Symposium on Foundations of Computer Science (Nov.)
-
-
Kushilevitz, E.1
Micali, S.2
Ostrovsky, R.3
-
14
-
-
0011583205
-
How to implement ISDNs without user observability: some remarks
-
Tech Rep. TR 14/85. University of Karlsruhe, Germany
-
Pfitzmann, A. 1985. How to implement ISDNs without user observability: some remarks. Tech Rep. TR 14/85. University of Karlsruhe, Germany
-
(1985)
-
-
Pfitzmann, A.1
-
15
-
-
0023331864
-
Networks without user observability
-
(Apr.)
-
Pfitzmann, A. and Waidner, M. 1987. Networks without user observability. Comput. Secur. 6, 2 (Apr.), 158-166
-
(1987)
Comput. Secur.
, vol.6
, pp. 158-166
-
-
Pfitzmann, A.1
Waidner, M.2
-
16
-
-
0011702966
-
ISDN-mixes: Untraceable communication with very small bandwidth overhead
-
In Proceedings of the GI/ITG Conference on Communication in Distributed Systems (Feb., Mannheim, Germany)
-
Pfitzmann, A., Pfitzmann, B., and Waidner, M. 1991. ISDN-mixes: Untraceable communication with very small bandwidth overhead. In Proceedings of the GI/ITG Conference on Communication in Distributed Systems (Feb., Mannheim, Germany). 451-463
-
(1991)
, pp. 451-463
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
17
-
-
0027224328
-
Cryptographic defense against traffic analysis
-
In Proceedings of the 25th Annual ACM Symposium on Theory of Computing (STOC '93, San Diego, CA, May 16-18), R. Kosaraju, D. Johnson, and A. Aggarwal, Chairs. ACM Press, New York, NY
-
Rackoff, C. and Simon, D. R. 1993. Cryptographic defense against traffic analysis. In Proceedings of the 25th Annual ACM Symposium on Theory of Computing (STOC '93, San Diego, CA, May 16-18), R. Kosaraju, D. Johnson, and A. Aggarwal, Chairs. ACM Press, New York, NY, 672-681
-
(1993)
, pp. 672-681
-
-
Rackoff, C.1
Simon, D.R.2
-
18
-
-
0030676973
-
Anonymous connections and onion routing
-
In Proceedings of the 1997 IEEE Computer Society Symposium on Reasearch in Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA
-
Syverson, P. F., Goldschlag, D. M., and Reed, M. G. 1997. Anonymous connections and onion routing. In Proceedings of the 1997 IEEE Computer Society Symposium on Reasearch in Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA
-
(1997)
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
19
-
-
84896508047
-
Unconditional sender and recipient untraceability in spite of active attacks
-
In Proceedings of the Workshop on Advances in Cryptology (EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY
-
Waidner, M. 1990. Unconditional sender and recipient untraceability in spite of active attacks. In Proceedings of the Workshop on Advances in Cryptology (EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY, 302-319
-
(1990)
, pp. 302-319
-
-
Waidner, M.1
-
20
-
-
85032863028
-
The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability
-
In Proceedings of the Workshop on Advances in Cryptology (EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY
-
Waidner, M. and Pfitzmann, B. 1990. The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability. In Proceedings of the Workshop on Advances in Cryptology (EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY, 690
-
(1990)
, pp. 690
-
-
Waidner, M.1
Pfitzmann, B.2
|