-
2
-
-
0025246897
-
A fair protocol for contract signing
-
Ben-Or, M., Goldreich, O., Micali, S., and Rivest, R. A fair protocol for contract signing, IEEE Trans. Inf. Theory 36 (1990), 40-46.
-
(1990)
IEEE Trans. Inf. Theory
, vol.36
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.4
-
3
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerated distributed computation
-
Chicago
-
Ben-Or, M., Goldwasser, S., and Wigderson, A. Completeness theorems for non-cryptographic fault-tolerated distributed computation. In Proceedings of 20th ACM Symposium on Theory of Computing (Chicago, 1988), pp. 1-10.
-
(1988)
Proceedings of 20th ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
84888252697
-
All-or-Nothing Disclosure of Secrets
-
Springer-Verlag, New York
-
Brassard, G, Crépeau, C., and Robert, J.-M. All-or-Nothing Disclosure of Secrets, Advances in Cryptology, Crypto '86, Lecture Notes in Computer Science, Vol. 263, Springer-Verlag, New York, 1987, pp. 234-238.
-
(1987)
Advances in Cryptology, Crypto '86, Lecture Notes in Computer Science
, vol.263
, pp. 234-238
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.-M.3
-
5
-
-
0018456171
-
Universal classes of hash functions
-
Carter, J.L., and Wegman, M.N. Universal classes of hash functions. J. Comput. Syst. Sci. 18 (1979), 143-154.
-
(1979)
J. Comput. Syst. Sci.
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
8
-
-
85032862578
-
Controlled Gradual Disclosure Schemes for Random Bits and Their Applications
-
Springer-Verlag, New York
-
Cleve, R. Controlled Gradual Disclosure Schemes for Random Bits and Their Applications, Advances in Cryptology, Crypto '89, Lecture Notes in Computer Science, Vol. 435, Springer-Verlag, New York 1987, pp. 573-587.
-
(1987)
Advances in Cryptology, Crypto '89, Lecture Notes in Computer Science
, vol.435
, pp. 573-587
-
-
Cleve, R.1
-
9
-
-
85028743337
-
Discreet Solitary Games
-
Springer-Verlag, New York
-
Crépeau, C., and Kilian, J. Discreet Solitary Games, Advances in Cryptology, Crypto '93, Lecture Notes in Computer Science, Vol. 773, Springer-Verlag, New York, 1994, pp. 319-330.
-
(1994)
Advances in Cryptology, Crypto '93, Lecture Notes in Computer Science
, vol.773
, pp. 319-330
-
-
Crépeau, C.1
Kilian, J.2
-
10
-
-
0022080529
-
A randomized protocol for signing contracts
-
Even, S., Goldreich, O., and Lempel, A. A randomized protocol for signing contracts. Commun. ACM 28 (1985), 637-647.
-
(1985)
Commun. ACM
, vol.28
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
11
-
-
0027986369
-
On minimal models for secure computation
-
Montréal
-
Feige, U., Kilian, J., and Naor, M. On minimal models for secure computation. In Proceedings of the 26th ACM Symposium on Theory of Computing (Montréal, 1994), pp. 554-563.
-
(1994)
Proceedings of the 26th ACM Symposium on Theory of Computing
, pp. 554-563
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
12
-
-
1542717478
-
Randomness, interactive proofs, and zero-knowledge - A survey
-
R. Herken, ed., Oxford University Press
-
Goldreich, O. Randomness, interactive proofs, and zero-knowledge - A survey. In The Universal Turing Machine: A Half Century Survey, R. Herken, ed., Oxford University Press, 1988, pp. 377-405.
-
(1988)
The Universal Turing Machine: a Half Century Survey
, pp. 377-405
-
-
Goldreich, O.1
-
13
-
-
0023545076
-
How to play any mental game
-
New York
-
Goldreich, O., Micali, M., and Wigderson, A. How to play any mental game. In Proceedings of the 19th ACM Symposium on Theory of Computing (New York, 1987), pp. 218-229.
-
(1987)
Proceedings of the 19th ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, M.2
Wigderson, A.3
-
15
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Aiken Computation Laboratory, Harvard University
-
Rabin, M.O. How to exchange secrets by oblivious transfer, Tech. Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981.
-
(1981)
Tech. Memo TR-81
-
-
Rabin, M.O.1
-
16
-
-
0020829007
-
Transaction protection by beacons
-
Rabin, M.O. Transaction protection by beacons. J. Computer Syst. Sci. 27 (1983), 256-267.
-
(1983)
J. Computer Syst. Sci.
, vol.27
, pp. 256-267
-
-
Rabin, M.O.1
-
17
-
-
3042680831
-
Mental poker
-
D. Klarner, ed. Wadsworth International
-
Shamir, A., Rivest, R., and Adleman, L. Mental poker. In The Mathematical Gardener, D. Klarner, ed. Wadsworth International, 1981, pp. 37-43.
-
(1981)
The Mathematical Gardener
, pp. 37-43
-
-
Shamir, A.1
Rivest, R.2
Adleman, L.3
-
18
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
Wegman, M.N., and Carter, J.L. New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22 (1981), 265-279.
-
(1981)
J. Comput. Syst. Sci.
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
-
19
-
-
0001998264
-
Conjugate coding
-
Wiesner, S. Conjugate coding. SIGACT News 15 (1983), 78-88.
-
(1983)
SIGACT News
, vol.15
, pp. 78-88
-
-
Wiesner, S.1
|