-
1
-
-
33746365751
-
-
J. Cryptol, vol. 4, no. 2, pp. 75-122, 1991.
-
D. Beaver, Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority, J. Cryptol, vol. 4, no. 2, pp. 75-122, 1991.
-
Secure Multiparty Protocols and Zero-knowledge Proof Systems Tolerating a Faulty Minority
-
-
Beaver, D.1
-
3
-
-
0029405656
-
-
IEEE Trans. Inform. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, Generalized privacy amplification, IEEE Trans. Inform. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
Generalized Privacy Amplification
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
4
-
-
0023985539
-
-
SIAM J. Comput, vol. 17, no. 2, pp. 210-229, Apr. 1988.
-
C. H. Bennett, G. Brassard, and J.-M. Robert, Privacy amplification by public discussion, SIAM J. Comput, vol. 17, no. 2, pp. 210-229, Apr. 1988.
-
Privacy Amplification by Public Discussion
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
6
-
-
0022864717
-
-
in Proc. 27th Annu. lEEESymp. on Foundations of Computer Science, 1986, pp. 168-173.
-
G. Brassard, C. Crépeau, and J.-M. Robert, Information theoretic reductions among disclosure problems, in Proc. 27th Annu. lEEESymp. on Foundations of Computer Science, 1986, pp. 168-173.
-
Information Theoretic Reductions among Disclosure Problems
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.-M.3
-
8
-
-
0348132170
-
-
Discr. Math., vol. 56, pp. 353, 1985.
-
G. Cohen and A. Lempel, Linear intersecting codes, Discr. Math., vol. 56, pp. 353, 1985.
-
Linear Intersecting Codes
-
-
Cohen, G.1
Lempel, A.2
-
9
-
-
0028550581
-
-
IEEE Trans. Inform. Theory, vol. 40, no. 6, pp. 1872-1881, Nov. 1994.
-
G. Cohen and G. Zémor, Intersecting codes and independent families, IEEE Trans. Inform. Theory, vol. 40, no. 6, pp. 1872-1881, Nov. 1994.
-
Intersecting Codes and Independent Families
-
-
Cohen, G.1
Zémor, G.2
-
11
-
-
33747173054
-
-
in Advances in Cryptology: Crypto '87 Proc. Berlin, Germany: Springer-Verlag, 1988, pp. 350-354.
-
Equivalence between two flavors of oblivious transfers (abstract), in Advances in Cryptology: Crypto '87 Proc. Berlin, Germany: Springer-Verlag, 1988, pp. 350-354.
-
Equivalence between Two Flavors of Oblivious Transfers (Abstract)
-
-
-
12
-
-
85032868401
-
-
in Advances in Cryptology: Eurocrypt '89 Proc. Berlin: Springer-Verlag, 1990, pp. 150-154.
-
Verifiable disclosure of secrets and applications, in Advances in Cryptology: Eurocrypt '89 Proc. Berlin: Springer-Verlag, 1990, pp. 150-154.
-
Verifiable Disclosure of Secrets and Applications
-
-
-
13
-
-
33747156126
-
-
Ph.D. dissertation, Dept. Elec. Engi. and Comput. Sei., MTT, Cambridge, MA, 1990, supervised by S. Micali.
-
Correct and private reductions among oblivious transfers, Ph.D. dissertation, Dept. Elec. Engi. and Comput. Sei., MTT, Cambridge, MA, 1990, supervised by S. Micali.
-
Correct and Private Reductions among Oblivious Transfers
-
-
-
14
-
-
84946290541
-
-
J. Mod. Opt., vol. 41, no. 12, pp. 2445-2454, Dec. 1994.
-
Quantum oblivious transfer, J. Mod. Opt., vol. 41, no. 12, pp. 2445-2454, Dec. 1994.
-
Quantum Oblivious Transfer
-
-
-
15
-
-
84957649042
-
-
in Advances in Cryptology: Crypto '95 Proc. Berlin: Springer-Verlag, 1995, pp. 110-123.
-
C. Crépeau, J. van de Graaf, and A. Tapp, Committed oblivious transfer and private multi-party computations, in Advances in Cryptology: Crypto '95 Proc. Berlin: Springer-Verlag, 1995, pp. 110-123.
-
Committed Oblivious Transfer and Private Multi-party Computations
-
-
Crépeau, C.1
Van De Graaf, J.2
Tapp, A.3
-
17
-
-
33747176258
-
-
CWl Quart., vol. 8, no. 2, pp. 97-109, June 1995.
-
C. Crépeau and L. Salvail, Oblivious verification of common string, CWl Quart., vol. 8, no. 2, pp. 97-109, June 1995.
-
Oblivious Verification of Common String
-
-
Crépeau, C.1
Salvail, L.2
-
18
-
-
84969350571
-
-
in Advances in Cryptology: Eurocrypt '91 Proc. Berlin: Springer-Verlag, 992, pp. 106-113.
-
C. Crépeau and M. Sântha, On the reversibility of oblivious transfer, in Advances in Cryptology: Eurocrypt '91 Proc. Berlin: Springer-Verlag, 992, pp. 106-113.
-
On the Reversibility of Oblivious Transfer
-
-
Crépeau, C.1
Sântha, M.2
-
19
-
-
21144435910
-
-
in Proc. Sequences II: Methods in Communications, Security, and Computer Science. Berlin: Springer-Verlag, 1993, pp. 360-368.
-
C. Crépeau and M. Sântha, Efficient reductions among oblivious transfer protocols based on new self-intersecting codes, in Proc. Sequences II: Methods in Communications, Security, and Computer Science. Berlin: Springer-Verlag, 1993, pp. 360-368.
-
Efficient Reductions among Oblivious Transfer Protocols Based on New Self-intersecting Codes
-
-
Crépeau, C.1
Sântha, M.2
-
20
-
-
0020878801
-
-
in Advances in Cryptology: Proc, Crypto '82. New York: Plenum, 1983, pp. 205-210
-
S. Even, 0. Goldreich, and A. Lempel, A randomized protocol for signing contracts, in Advances in Cryptology: Proc, Crypto '82. New York: Plenum, 1983, pp. 205-210
-
A Randomized Protocol for Signing Contracts
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
21
-
-
0030150177
-
-
Commun. Assoc. Comput, Mach., vol. 39, no. 5, pp. 77-85, May 1996.
-
R. Fagin, M. Naor, and P. Winkler, Comparing common secret information without leaking it, Commun. Assoc. Comput, Mach., vol. 39, no. 5, pp. 77-85, May 1996.
-
Comparing Common Secret Information without Leaking It
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
23
-
-
0023545076
-
-
in Proc. 19th Annual ACM Symp. on Theory of Computing, 1987, pp. 218-229.
-
O. Goldreich, S. Micali, and A. Wigderson, How to play any mental game, or: A completeness theorem for protocols with honest majority, in Proc. 19th Annual ACM Symp. on Theory of Computing, 1987, pp. 218-229.
-
How to Play Any Mental Game, Or: a Completeness Theorem for Protocols with Honest Majority
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
26
-
-
0024611659
-
-
SIAM J. Comput., vol. 18, pp. 186-208, 1989.
-
S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof-systems, SIAM J. Comput., vol. 18, pp. 186-208, 1989.
-
The Knowledge Complexity of Interactive Proof-systems
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
27
-
-
0000942249
-
-
Sov. Math.-Dokl, vol. 24, no. 1, pp. 170-172, 1981.
-
V. D. Goppa, Codes on algebraic curves, Sov. Math.-Dokl, vol. 24, no. 1, pp. 170-172, 1981.
-
Codes on Algebraic Curves
-
-
Goppa, V.D.1
-
28
-
-
0011560545
-
-
J. Statist. Plan. Inference, vol. 8, pp. 375-388, 1983.
-
G. Katona and J. Srivastava, Minimal 2-coverings of finite affine spaces based on GF(2), J. Statist. Plan. Inference, vol. 8, pp. 375-388, 1983.
-
Minimal 2-coverings of Finite Affine Spaces Based on GF(2)
-
-
Katona, G.1
Srivastava, J.2
-
29
-
-
0021392134
-
-
IEEE Trans. Inform. Theory, vol. IT-30, no. 2, pp. 353-355, Mar. 1984.
-
G. L. Katsman, M. A. Tsfasrnan, and S. G. VläduJ, Modular curves and codes with a polynomial construction, IEEE Trans. Inform. Theory, vol. IT-30, no. 2, pp. 353-355, Mar. 1984.
-
Modular Curves and Codes with a Polynomial Construction
-
-
Katsman, G.L.1
Tsfasrnan, M.A.2
Vläduj, S.G.3
-
32
-
-
33747174543
-
-
private communication
-
private communication
-
-
-
-
33
-
-
0024769470
-
-
in Proc. 30th Ann. IEEE Symp. on Foundations of Computer Science, 1989, pp. 474-479.
-
J. Kilian, S. Micali, and R. Ostrovsky, Minimum resource zero-knowledge proofs, in Proc. 30th Ann. IEEE Symp. on Foundations of Computer Science, 1989, pp. 474-479.
-
Minimum Resource Zero-knowledge Proofs
-
-
Kilian, J.1
Micali, S.2
Ostrovsky, R.3
-
36
-
-
84974655726
-
-
IK Advances in Cryptology: Crypto '91 Proc. Berlin: Springer-Verlag, 1992, pp. 392-404.
-
S. Micali and P. Rogaway, Secure computation, IK Advances in Cryptology: Crypto '91 Proc. Berlin: Springer-Verlag, 1992, pp. 392-404.
-
Secure Computation
-
-
Micali, S.1
Rogaway, P.2
-
37
-
-
0021510441
-
-
Discr. Appl. Math., vol. 9, no. 2, pp. 187-196, 1984.
-
D. Miklos, Linear binary codes with intersecting properties, Discr. Appl. Math., vol. 9, no. 2, pp. 187-196, 1984.
-
Linear Binary Codes with Intersecting Properties
-
-
Miklos, D.1
-
38
-
-
0026237211
-
-
Computers & Security, vol. 10, no. 6, pp. 553-560, 1991.
-
H. Nurmi, A. Salomaa, and L. Santean, Secret ballot elections in computer networks, Computers & Security, vol. 10, no. 6, pp. 553-560, 1991.
-
Secret Ballot Elections in Computer Networks
-
-
Nurmi, H.1
Salomaa, A.2
Santean, L.3
-
40
-
-
0024706089
-
-
IEEE Trans. Inform. Theory, vol. 35, pp. 822-829, 1989.
-
C. T. Retter, Intersecting Goppa codes, IEEE Trans. Inform. Theory, vol. 35, pp. 822-829, 1989.
-
Intersecting Goppa Codes
-
-
Retter, C.T.1
-
41
-
-
1342318990
-
-
Inform. Comput., vol. 121, no. 1, pp. 23-40, 1995.
-
A. De Santis, G. Di Crescenzo, and G. Persiano, Zero-knowledge arguments and public-key cryptography, Inform. Comput., vol. 121, no. 1, pp. 23-40, 1995.
-
Zero-knowledge Arguments and Public-key Cryptography
-
-
De Santis, A.1
Di Crescenzo, G.2
Persiano, G.3
-
43
-
-
0001998264
-
-
SigactNews, vol. 15, no. 1, pp. 78-88, 1983. Original manuscript written circa 1970
-
S. Wiesner, Conjugate coding, SigactNews, vol. 15, no. 1, pp. 78-88, 1983. Original manuscript written circa 1970
-
Conjugate Coding
-
-
Wiesner, S.1
|