-
1
-
-
0023572885
-
Recognizing primes in random polynomial time
-
ACM, New York
-
L. M. ADLEMAN AND M. A. HUANG, Recognizing primes in random polynomial time, in Proc. 19th ACM Symposium on Theory of Computing, ACM, New York, 1987, pp. 462-469.
-
(1987)
Proc. 19th ACM Symposium on Theory of Computing
, pp. 462-469
-
-
Adleman, L.M.1
Huang, M.A.2
-
2
-
-
0025137207
-
The round complexity of secure protocols
-
ACM, New York
-
D. BEAVER, S. MICALI, AND P. ROGAWAY, The round complexity of secure protocols, in Proc. 22th ACM Symposium on Theory of Computing, ACM, New York, 1990.
-
(1990)
Proc. 22th ACM Symposium on Theory of Computing
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
3
-
-
84898960610
-
Completeness theorems for fault-tolerant distributed computing
-
ACM, New York
-
M. BEN-OR, S. GOLDWASSER, AND A. WIGDERSON, Completeness theorems for fault-tolerant distributed computing, in Proc. 20th ACM Symposium on Theory of Computing, ACM, New York, 1988, pp. 1-10.
-
(1988)
Proc. 20th ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
5244346835
-
Interactive consistency in constant time
-
submitted
-
M. BEN-OR AND R. EL-YANIV, Interactive consistency in constant time, Distrib. Comput., 1991, submitted.
-
(1991)
Distrib. Comput.
-
-
Ben-Or, M.1
El-Yaniv, R.2
-
5
-
-
0020976844
-
Another advantage of free choice: Completely asynchronous agreement protocols
-
ACM, New York
-
M. BEN-OR, Another advantage of free choice: Completely asynchronous agreement protocols, in Proc. 2nd Annual Symposium on Principles of Distributed Computing, ACM, New York, 1983, pp. 27-30.
-
(1983)
Proc. 2nd Annual Symposium on Principles of Distributed Computing
, pp. 27-30
-
-
Ben-Or, M.1
-
6
-
-
0021900599
-
An "o(log n)" expected rounds randomized Byzantine generals protocol
-
ACM, New York
-
G. BRACHA, An "o(log n)" expected rounds randomized Byzantine generals protocol, in Proc. 17th ACM Symposium on Theory of Computing, ACM, New York, 1985.
-
(1985)
Proc. 17th ACM Symposium on Theory of Computing
-
-
Bracha, G.1
-
7
-
-
0027313816
-
Fast asynchronous agreement with optimal resilience
-
ACM, New York
-
R. CANETTI AND T. RABIN, Fast asynchronous agreement with optimal resilience, in Proc. 25th ACM Symposium on Theory of Computing, ACM, New York, 1993, pp. 42-51.
-
(1993)
Proc. 25th ACM Symposium on Theory of Computing
, pp. 42-51
-
-
Canetti, R.1
Rabin, T.2
-
8
-
-
0022082037
-
A simple and efficient randomized Byzantine agreement problem
-
B. CHOR AND B. COAN, A simple and efficient randomized Byzantine agreement problem, IEEE Trans. Software Engrg., SE-11 (1985), pp. 531-539.
-
(1985)
IEEE Trans. Software Engrg.
, vol.SE-11
, pp. 531-539
-
-
Chor, B.1
Coan, B.2
-
9
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
IEEE Computer Society Press, Los Alamitos, CA
-
B. CHOR, S. GOLDWASSER, S. MICALI, AND B. AWERBUCH, Verifiable secret sharing and achieving simultaneity in the presence of faults, in Proc. 26th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1985, pp. 383-395.
-
(1985)
Proc. 26th Annual IEEE Symposium on Foundations of Computer Science
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
10
-
-
84898947315
-
Multi-party unconditionally secure protocols
-
ACM, New York
-
D. CHAUM, C. CREPEAU, AND I. DAMGÅRD, Multi-party unconditionally secure protocols, in Proc. 20th ACM Symposium on Theory of Computing, ACM, New York, 1988.
-
(1988)
Proc. 20th ACM Symposium on Theory of Computing
-
-
Chaum, D.1
Crepeau, C.2
Damgård, I.3
-
11
-
-
0012242251
-
Randomization in Byzantine agreement
-
S. Micali, ed., JAI Press, Greenwich, CT
-
B. CHOR AND C. DWORK, Randomization in Byzantine agreement, in Randomness and Computation, S. Micali, ed., JAI Press, Greenwich, CT, 1989, pp. 433-498.
-
(1989)
Randomness and Computation
, pp. 433-498
-
-
Chor, B.1
Dwork, C.2
-
12
-
-
0020097405
-
An efficient algorithm for Byzantine agreement without authentication
-
D. DOLEV, M. FISCHER, R. FOWLER, N. LYNCH, AND H. STRONG, An efficient algorithm for Byzantine agreement without authentication, Inform. and Control, 52 (1982), pp. 257-274.
-
(1982)
Inform. and Control
, vol.52
, pp. 257-274
-
-
Dolev, D.1
Fischer, M.2
Fowler, R.3
Lynch, N.4
Strong, H.5
-
13
-
-
0009768331
-
The Byzantine generals strike again
-
D. DOLEV, The Byzantine generals strike again, J. Algorithms, 3 (1982), pp. 14-30.
-
(1982)
J. Algorithms
, vol.3
, pp. 14-30
-
-
Dolev, D.1
-
15
-
-
85028450627
-
Non-malleable cryptography
-
ACM, New York
-
D. DOLEV, C. DWORK, AND M. NAOR, Non-malleable cryptography, in Proc. 23rd ACM Symposium on Theory of Computing, ACM, New York, 1993, pp. 542-552.
-
(1993)
Proc. 23rd ACM Symposium on Theory of Computing
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
16
-
-
0025448931
-
Flipping persuasively in constant expected time
-
C. DWORK, D. SHMOYS, AND L. STOCKMEYER, Flipping persuasively in constant expected time, SIAM J. Comput., 19 (1990), pp. 472-499.
-
(1990)
SIAM J. Comput.
, vol.19
, pp. 472-499
-
-
Dwork, C.1
Shmoys, D.2
Stockmeyer, L.3
-
17
-
-
0347598548
-
-
Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA
-
P. FELDMAN, Optimal algorithms for Byzantine agreement, Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA, 1988.
-
(1988)
Optimal Algorithms for Byzantine Agreement
-
-
Feldman, P.1
-
18
-
-
0022185625
-
Byzantine agreement in constant expected time (and trusting no one)
-
IEEE Computer Society Press, Los Alamitos, CA
-
P. FELDMAN AND S. MICALI, Byzantine agreement in constant expected time (and trusting no one), in Proc. 26th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1985, pp. 267-276.
-
(1985)
Proc. 26th Annual IEEE Symposium on Foundations of Computer Science
, pp. 267-276
-
-
Feldman, P.1
Micali, S.2
-
20
-
-
0000613943
-
A lower bound for the time to assure interactive consistency
-
M. FISCHER AND N. LYNCH, A lower bound for the time to assure interactive consistency, Inform. Process. Lett., 14 (1982), pp. 183-186.
-
(1982)
Inform. Process. Lett.
, vol.14
, pp. 183-186
-
-
Fischer, M.1
Lynch, N.2
-
21
-
-
84976655650
-
Cryptographic computation: Secure falt-tolerant protocols and public-key model
-
Springer-Verlag, Berlin
-
Z. GALIL, S. HABER, AND M. YUNG, Cryptographic computation: Secure falt-tolerant protocols and public-key model, in Proc. CRYPTO '87, Springer-Verlag, Berlin, 1987, pp. 135-155.
-
(1987)
Proc. CRYPTO '87
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
22
-
-
0002574855
-
Almost all primes can be quickly certified
-
ACM, New York
-
S. GOLDWASSER AND J. KILIAN, Almost all primes can be quickly certified, in Proc. 18th ACM Symposium on Theory of Computing, ACM, New York, 1986, pp. 316-329.
-
(1986)
Proc. 18th ACM Symposium on Theory of Computing
, pp. 316-329
-
-
Goldwasser, S.1
Kilian, J.2
-
24
-
-
0024611659
-
The knowledge complexity of interactive proof-systems
-
S. GOLDWASSER, S. MICALI, AND C. RACKOFF, The knowledge complexity of interactive proof-systems, SIAM. J. Comput., 18 (1989), pp. 186-208.
-
(1989)
SIAM. J. Comput.
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
25
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. GOLDWASSER, S. MICALI, AND R. RIVEST, A digital signature scheme secure against adaptive chosen-message attacks, SIAM J. Comput., 17 (1988), pp. 281-308.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
26
-
-
0023545076
-
How to play any mental game, or a completeness theorem for protocols with honest majority
-
ACM, New York
-
O. GOLDREICH, S. MICALI, AND A. WIGDERSON, How to play any mental game, or a completeness theorem for protocols with honest majority, in Proc. 19th ACM Symposium on Theory of Computing, ACM, New York, 1987, pp. 218-229.
-
(1987)
Proc. 19th ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
27
-
-
0025505941
-
The best of both worlds: Guaranteeing termination in fast randomized Byzantine agreement protocols
-
O. GOLDREICH AND E. PETRANK, The best of both worlds: Guaranteeing termination in fast randomized Byzantine agreement protocols, Inform. Process. Lett., 36 (1990), pp. 45-49.
-
(1990)
Inform. Process. Lett.
, vol.36
, pp. 45-49
-
-
Goldreich, O.1
Petrank, E.2
-
29
-
-
85088201127
-
Collective coin tossing without assumptions nor broadcasting
-
Springer-Verlag, Berlin
-
S. MICALI AND T. RABIN, Collective coin tossing without assumptions nor broadcasting, in Proc. CRYPTO '90, Springer-Verlag, Berlin, 1990, pp. 253-266.
-
(1990)
Proc. CRYPTO '90
, pp. 253-266
-
-
Micali, S.1
Rabin, T.2
-
30
-
-
0002187139
-
Secure computation
-
Springer-Verlag, Berlin, full paper available from authors
-
S. MICALI AND P. ROGAWAY, Secure computation, in Proc. CRYPTO '91, Springer-Verlag, Berlin, 1992; full paper available from authors.
-
(1992)
Proc. CRYPTO '91
-
-
Micali, S.1
Rogaway, P.2
-
31
-
-
0024136156
-
Coordinated travel: (t + 1)-round Byzantine agreement in polynomial time
-
IEEE Computer Society Press, Los Alamitos, CA
-
Y. MOSES AND O. WAARTS, Coordinated travel: (t + 1)-round Byzantine agreement in polynomial time, in Proc. 29th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1988, pp. 246-255.
-
(1988)
Proc. 29th Annual IEEE Symposium on Foundations of Computer Science
, pp. 246-255
-
-
Moses, Y.1
Waarts, O.2
-
32
-
-
84976810569
-
Reaching agreement in the presence of faults
-
M. PEASE, R. SHOSTAK, AND L. LAMPORT, Reaching agreement in the presence of faults, J. Assoc. Comput. Mach., 27 (1980), pp. 228-234.
-
(1980)
J. Assoc. Comput. Mach.
, vol.27
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
33
-
-
33845432604
-
Probabilistic algorithms for testing primality
-
M. RABIN, Probabilistic algorithms for testing primality, J. Number Theory, 12 (1980), pp. 128-138.
-
(1980)
J. Number Theory
, vol.12
, pp. 128-138
-
-
Rabin, M.1
-
34
-
-
0020881178
-
Randomized Byzantine generals
-
IEEE Computer Society Press, Los Alamitos, CA
-
M. RABIN, Randomized Byzantine generals, in Proc. 24th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1983, pp. 403-409.
-
(1983)
Proc. 24th Annual IEEE Symposium on Foundations of Computer Science
, pp. 403-409
-
-
Rabin, M.1
-
35
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
ACM, New York
-
T. RABIN AND M. BEN-OR, Verifiable secret sharing and multiparty protocols with honest majority, in Proc. 21th ACM Symposium on Theory of Computing, ACM, New York, 1989.
-
(1989)
Proc. 21th ACM Symposium on Theory of Computing
-
-
Rabin, T.1
Ben-Or, M.2
-
36
-
-
0001873077
-
A fast Monte-Carlo test for primality
-
R. SOLOVAY AND V. STRASSEN, A fast Monte-Carlo test for primality, SIAM J. Comput., 6 (1977), pp. 84-85.
-
(1977)
SIAM J. Comput.
, vol.6
, pp. 84-85
-
-
Solovay, R.1
Strassen, V.2
-
37
-
-
0021372186
-
Extending binary Byzantine agreement to multivalued Byzantine agreement
-
R. TURPIN AND B. COAN, Extending binary Byzantine agreement to multivalued Byzantine agreement, Inform. Process. Lett., 18 (1984), pp. 73-76.
-
(1984)
Inform. Process. Lett.
, vol.18
, pp. 73-76
-
-
Turpin, R.1
Coan, B.2
|