-
1
-
-
0027695921
-
Privacy, additional information, and communication
-
November, 1930-1943
-
R. Bar-Yehuda, B. Chor, E. Kushilevitz, A. Orlitsky. "Privacy, Additional Information, and Communication. " IEEE Trans. Info. Theory 39:6, November 1993, 1930-1943.
-
(1993)
IEEE Trans. Info. Theory
, vol.39
, pp. 6
-
-
Bar-Yehuda, R.1
Chor, B.2
Kushilevitz, E.3
Orlitsky, A.4
-
2
-
-
84928743703
-
Precomputing oblivious transfer
-
Springer-Verlag LNCS
-
D. Beaver. "Precomputing Oblivious Transfer." Advances in Cryptology - Crypto'95 Proceedings, Springer-Verlag LNCS 963, 1995, 97-109.
-
(1995)
Advances in Cryptology - Crypto'95 Proceedings
, vol.963
, pp. 97-109
-
-
Beaver, D.1
-
5
-
-
33750715323
-
Global, unpredictable bit generation without broadcast
-
Springer-Verlag LNCS 765
-
D. Beaver, N. So. "Global, Unpredictable Bit Generation Without Broadcast." Advances in Cryptology - Eurocrypt'93 Proceedings, Springer-Verlag LNCS 765, 1994, 424-434.
-
(1994)
Advances in Cryptology - Eurocrypt'93 Proceedings
, pp. 424-434
-
-
Beaver, D.1
So, N.2
-
6
-
-
85032877753
-
Non-interactive oblivious transfer and applications
-
Springer-Verlag LNCS 435
-
M. Bellare, S. Micali. "Non-Interactive Oblivious Transfer and Applications." Advances in Cryptology - Crypto'89 Proceedings, Springer-Verlag LNCS 435, 1990, 547-557.
-
(1990)
Advances in Cryptology - Crypto'89 Proceedings
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
7
-
-
85028745601
-
Another advantage of free choice
-
ACM
-
nd PODC, ACM, 1983.
-
(1983)
nd PODC
-
-
Ben-Or, M.1
-
8
-
-
0021522644
-
How to generate cryptographically strong sequences of Pseudo-random bits
-
M. Blum, S. Micali. "How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits." SIAM J. on Computing 13, 1984, 850-864.
-
(1984)
SIAM J. on Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
10
-
-
84888252697
-
All or nothing disclosure of secrets
-
Springer-Verlag LNCS
-
G. Brassard, C. Crepeau, J. Robert. "All or Nothing Disclosure of Secrets." Advances in Cryptology - Crypto'86 Proceedings, Springer-Verlag LNCS 263, 1987, 234-238.
-
(1987)
Advances in Cryptology - Crypto'86 Proceedings
, vol.263
, pp. 234-238
-
-
Brassard, G.1
Crepeau, C.2
Robert, J.3
-
11
-
-
0022864717
-
Information theoretic reductions among disclosure problems
-
IEEE
-
G. Brassard, C. Crépeau, J. Robert. "Information Theoretic Reductions Among Disclosure Problems." Proceedings of the 21th FOCS, IEEE, 1986, 1986, 168-173.
-
(1986)
Proceedings of the 21th FOCS
, vol.1986
, pp. 168-173
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.3
-
12
-
-
0002738457
-
A zero-one law for boolean privacy
-
February
-
B. Chor, E. Kushilevitz. "A Zero-One Law for Boolean Privacy." SIAM J. Disc. Math. 4:1, February 1991, 36-47.
-
(1991)
SIAM J. Disc. Math
, vol.4
, Issue.1
, pp. 36-47
-
-
Chor, B.1
Kushilevitz, E.2
-
13
-
-
85030121757
-
Equivalence between two flavours of oblivious transfers
-
Springer-Verlag LNCS
-
C. Crepeau. "Equivalence Between Two Flavours of Oblivious Transfers." Advances in Cryptology - Crypto'81 Proceedings, Springer-Verlag LNCS 293, 1988, 350-354.
-
(1988)
Advances in Cryptology - Crypto'81 Proceedings
, vol.293
, pp. 350-354
-
-
Crepeau, C.1
-
16
-
-
84976655650
-
Cryptographic computation: Secure fault-tolerant protocols and the public-key model
-
Springer-Verlag LNCS
-
Z. Galil, S. Haber, M. Yung. "Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model." Advances in Cryptology - Crypto'87 Proceedings, Springer-Verlag LNCS 293, 1988, 1988, 135-155.
-
(1988)
Advances in Cryptology - Crypto'87 Proceedings
, vol.293
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
19
-
-
85032194875
-
How to solve any protocol problem - An efficiency improvement
-
Springer-Verlag
-
O. Goldreich, R. Vainish. "How to Solve any Protocol Problem - An Efficiency Improvement." Proceedings of Crypto 1987, Springer-Verlag, 1988, 73-86.
-
(1988)
Proceedings of Crypto 1987
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
20
-
-
33747194089
-
Fair computation of general functions in presence of immoral majority
-
S. Goldwasser, L. Levin. "Fair Computation of General Functions in Presence of Immoral Majority." Proceedings of Crypto 1990.
-
(1990)
Proceedings of Crypto
-
-
Goldwasser, S.1
Levin, L.2
-
21
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, C. Rackoff. "The Knowledge Complexity of Interactive Proof Systems." SIAM J. on Computing 18:1, 1989, 186-208.
-
(1989)
SIAM J. on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
23
-
-
0024866742
-
Limits on the provable consequences of one-way permutations
-
ACM
-
st STOC, ACM, 1989, 1989, 44-62.
-
(1989)
st STOC
, vol.1989
, pp. 44-62
-
-
Impagliazzo, R.1
Rudich, S.2
-
24
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
ACM
-
th STOC, ACM, 1988, 1988, 20-29.
-
(1988)
th STOC
, vol.1988
, pp. 20-29
-
-
Kilian, J.1
-
25
-
-
4544353942
-
A general completeness theorem for two-party games
-
ACM
-
rd STOC, ACM, 1991, 553-560.
-
(1991)
rd STOC
, pp. 553-560
-
-
Kilian, J.1
-
27
-
-
0002365530
-
Privacy and communication complexity
-
May
-
E. Kushilevitz. "Privacy and Communication Complexity", SIAM J. Disc. Math. 5:2, May 1992, 273-284.
-
(1992)
SIAM J. Disc. Math
, vol.5
, Issue.2
, pp. 273-284
-
-
Kushilevitz, E.1
-
31
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE
-
th FOCS, IEEE, 1986, 1986, 162-167.
-
(1986)
th FOCS
, vol.1986
, pp. 162-167
-
-
Yao, A.1
|