-
1
-
-
85031636408
-
-
Preliminary version: "Proc. 26th Symp. on Foundations of Computer Science, 1985
-
M. Ajtai and A. Wigderson, "Deterministic Simulations of Probabilistic Constant Depth Circuits, ADVCR: Advances in Computing Research," Vol. 5, 1989. [Preliminary version: "Proc. 26th Symp. on Foundations of Computer Science, 1985," pp. 11-19]
-
(1989)
Deterministic Simulations of Probabilistic Constant Depth Circuits, ADVCR: Advances in Computing Research
, vol.5
, pp. 11-19
-
-
Ajtai, M.1
Wigderson, A.2
-
2
-
-
0023985196
-
RSA and Rabin functions: Certain parts are as hard as the whole
-
W. B. Alexi, B. Chor, O. Goldreich, and C. P. Schnorr, RSA and Rabin functions: Certain parts are as hard as the whole, SIAM J. Comput. 17, No. 2 (1988), 194-209.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 194-209
-
-
Alexi, W.B.1
Chor, B.2
Goldreich, O.3
Schnorr, C.P.4
-
4
-
-
0026940019
-
Multiparty protocols, pseudo-random generators for logspace, and time-space tradeoffs
-
L. Babai, N. Nisan, and M. Szegedy, Multiparty protocols, pseudo-random generators for logspace, and time-space tradeoffs, J. Comput. System Sci. 45, No. 2 (1992), 204-232.
-
(1992)
J. Comput. System Sci.
, vol.45
, Issue.2
, pp. 204-232
-
-
Babai, L.1
Nisan, N.2
Szegedy, M.3
-
5
-
-
0023985412
-
How to generate factored random numbers
-
E. Bach, How to generate factored random numbers, SIAM J. Comput. 17 No. 2 (1988), 179-193.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 179-193
-
-
Bach, E.1
-
6
-
-
0022811668
-
Log depth circuits for division and related problems
-
P. W. Beame, S. A. Cook, and H. J. Hoover, Log depth circuits for division and related problems, SIAM J. Comput. 15 (1986), 994-1003.
-
(1986)
SIAM J. Comput.
, vol.15
, pp. 994-1003
-
-
Beame, P.W.1
Cook, S.A.2
Hoover, H.J.3
-
7
-
-
85024585723
-
Incremental cryptography: The case of hashing and signing
-
Advances in Cryptology - CRYPTO '94," Springer-Verlag, New York/Berlin
-
M. Bellare, O. Goldreich, and S. Goldwasser, Incremental cryptography: The case of hashing and signing, in "Advances in Cryptology - CRYPTO '94," Lecture Notes in Computer Science, Vol. 839, pp. 216-233, Springer-Verlag, New York/Berlin, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 216-233
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
8
-
-
0345350047
-
Incremental cryptography with application to virus protection
-
M. Bellare, O. Goldreich, and S. Goldwasser, Incremental cryptography with application to virus protection, in "Proc. 27th Ann. ACM Symp. on Theory of Computing, 1995," pp. 45-56.
-
Proc. 27th Ann. ACM Symp. on Theory of Computing, 1995
, pp. 45-56
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
9
-
-
85032877754
-
New paradigms for digital signatures and message authentication based on non-interactive zero knowledge proofs
-
Advances in Cryptology - CRYPTO '89," Springer-Verlag
-
M. Bellare and S. Goldwasser, New paradigms for digital signatures and message authentication based on non-interactive zero knowledge proofs, in "Advances in Cryptology - CRYPTO '89," Lecture Notes in Computer Science, Vol. 435, pp. 194-211, Springer-Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 194-211
-
-
Bellare, M.1
Goldwasser, S.2
-
10
-
-
85031632127
-
Generalized Diffie-Hellman modulo a composite is not weaker than factoring
-
E. Biham, D. Boneh, and O. Reingold, Generalized Diffie-Hellman modulo a composite is not weaker than factoring, in "Theory of Cryptography Library," Record 97-14 at http://theory.lcs.mit.edu/t ̃cryptol/homepage.html.
-
Theory of Cryptography Library,Record
, vol.97
, Issue.14
-
-
Biham, E.1
Boneh, D.2
Reingold, O.3
-
11
-
-
0022716288
-
A simple secure unpredictable pseudo-random number generator
-
L. Blum, M. Blum, and M. Shub, A simple secure unpredictable pseudo-random number generator, SIAM J. Comput. 15 (1986), 364-383.
-
(1986)
SIAM J. Comput.
, vol.15
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
12
-
-
0028482823
-
Checking the correctness of memories
-
Preliminary version: "Proc. 31st Symp. on Foundations of Computer Science, 1990
-
M. Blum, W. Evans, P. Gemmell, S. Kannan, and M. Naor, Checking the correctness of memories, in "Algorithmica, 1994," pp. 225-244. [Preliminary version: "Proc. 31st Symp. on Foundations of Computer Science, 1990"]
-
Algorithmica, 1994
, pp. 225-244
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
13
-
-
84877639283
-
Cryptographic primitives based on hard learning problems
-
Advances in Cryptology - CRYPTO '93," Springer-Verlag
-
A. Blum, M. Furst, M. Kearns, and R. J. Lipton, Cryptographic primitives based on hard learning problems, in "Advances in Cryptology - CRYPTO '93," Lecture Notes in Computer Science, Vol. 773, pp. 278-291, Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 278-291
-
-
Blum, A.1
Furst, M.2
Kearns, M.3
Lipton, R.J.4
-
14
-
-
0021522644
-
How to generate cryptographically strong sequence of pseudo-random bits
-
M. Blum and S. Micali, How to generate cryptographically strong sequence of pseudo-random bits, SIAM J. Comput. 13 (1984), 850-864.
-
(1984)
SIAM J. Comput.
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
15
-
-
84955604812
-
Algorithms for Black-Box fields and their application to cryptography
-
Springer
-
D. Boneh and R. Lipton, Algorithms for Black-Box fields and their application to cryptography, in "Advances in Cryptology - CRYPTO '96," LNCS, Vol. 1109, pp. 283-297, Springer, 1996.
-
(1996)
Advances in Cryptology - CRYPTO '96, LNCS
, vol.1109
, pp. 283-297
-
-
Boneh, D.1
Lipton, R.2
-
16
-
-
0008966306
-
Modern Cryptology
-
Springer-Verlag, New York/Berlin
-
G. Brassard, "Modern Cryptology," Lecture Notes in Computer Science, Vol. 325, Springer-Verlag, New York/Berlin, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.325
-
-
Brassard, G.1
-
18
-
-
33847493960
-
Complexity theoretic issues concerning block ciphers related to D.E.S
-
Advances in Cryptology - CRYPTO '90," Springer-Verlag
-
R. Cleve, Complexity theoretic issues concerning block ciphers related to D.E.S., in "Advances in Cryptology - CRYPTO '90," Lecture Notes in Computer Science, Vol. 537, pp. 530-544, Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.537
, pp. 530-544
-
-
Cleve, R.1
-
19
-
-
84985922619
-
Tracing traitors
-
Springer-Verlag
-
B. Chor, A. Fiat, and M. Naor, Tracing traitors, in "Advances in Cryptology - CRYPTO '94," pp. 257-270, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - CRYPTO '94
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
20
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
B. Chor and O. Goldreich, Unbiased bits from sources of weak randomness and probabilistic communication complexity, SIAM J. Comput. 17 (1988), 230-261.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
22
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory 22, No. 6 (1976), 644-654.
-
(1976)
IEEE Trans. Inform. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
23
-
-
84957376046
-
Stronger security proofs for RSA and Rabin bits
-
Advances in Cryptology - EUROCRYPT '97, Springer-Verlag
-
R. Fischlin and C. P. Schnorr, Stronger security proofs for RSA and Rabin bits, in "Advances in Cryptology - EUROCRYPT '97," Lecture Notes in Computer Science, Vol. 1233, pp. 267-279, Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 267-279
-
-
Fischlin, R.1
Schnorr, C.P.2
-
24
-
-
84969346237
-
Two remarks concerning the Goldwasser-Micali-Rivest signature scheme
-
Advances in Cryptology - CRYPTO '86," Springer-Verlag
-
O. Goldreich, Two remarks concerning the Goldwasser-Micali-Rivest signature scheme, in "Advances in Cryptology - CRYPTO '86," Lecture Notes in Computer Science, Vol. 263, pp. 104-110, Springer-Verlag, 1987.
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 104-110
-
-
Goldreich, O.1
-
26
-
-
85031619888
-
-
Electronic publication: Electronic Colloquium on Computational Complexity.
-
O. Goldreich, "Foundations of Cryptography (Fragments of a Book)," 1995. Electronic publication: http://www.eccc.uni-trier.de/eccc/info/ECCC-Books/eccc-books.html (Electronic Colloquium on Computational Complexity).
-
(1995)
Foundations of Cryptography (Fragments of a Book)
-
-
Goldreich, O.1
-
27
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali, How to construct random functions, J. Assoc. Comput. Mach. 33 (1986), 792-807.
-
(1986)
J. Assoc. Comput. Mach.
, vol.33
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
28
-
-
85028838274
-
On the cryptographic applications of random functions
-
Advances in Cryptology - CRYPTO '84," Springer-Verlag
-
O. Goldreich, S. Goldwasser, and S. Micali, On the cryptographic applications of random functions, in "Advances in Cryptology - CRYPTO '84," Lecture Notes in Computer Science, Vol. 196, pp. 276-288, Springer-Verlag, 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.196
, pp. 276-288
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
31
-
-
0344056457
-
The discrete logarithm modula a composite hides
-
J. Hastad, A. W. Schrift, and A. Shamir, The discrete logarithm modula a composite hides O(n) bits, J. of Computer and System Sciences 47 (1993), 376-404.
-
(1993)
O(n) Bits, J. of Computer and System Sciences
, vol.47
, pp. 376-404
-
-
Hastad, J.1
Schrift, A.W.2
Shamir, A.3
-
32
-
-
70350343066
-
Construction of a pseudo-random generator from any one-way function
-
to appear in [Preliminary versions by Impagliazzo et al. in "21st STOC 1989" and Hastad in "22nd STOC, 1990"]
-
J. Hastad, R. Impagliazzo, L. A. Levin, and M. Luby, Construction of a pseudo-random generator from any one-way function, SIAM J. Comput., to appear in [Preliminary versions by Impagliazzo et al. in "21st STOC 1989" and Hastad in "22nd STOC, 1990"]
-
SIAM J. Comput.
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
33
-
-
0345352219
-
Public randomness in cryptography
-
Advances in Cryptology - CRYPTO '92," Springer-Verlag
-
A. Herzberg and M. Luby, Public randomness in cryptography, in "Advances in Cryptology - CRYPTO '92," Lecture Notes in Computer Science, Vol. 740, pp. 421-432, Springer-Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.740
, pp. 421-432
-
-
Herzberg, A.1
Luby, M.2
-
35
-
-
0001143795
-
Efficient cryptographic schemes probably secure as subset sum
-
R. Impagliazzo and M. Naor, Efficient cryptographic schemes probably secure as subset sum, J. Cryptology 9 (1996), 199-216.
-
(1996)
J. Cryptology
, vol.9
, pp. 199-216
-
-
Impagliazzo, R.1
Naor, M.2
-
37
-
-
0002065879
-
Parallel algorithms for shared-memory machines
-
(J. van Leeuwen, Ed.), MIT Press, Cambridge, MA
-
R. M. Karp and V. Ramachandran, Parallel algorithms for shared-memory machines, in "Handbook of Theoretical Computer Science, Vol. A" (J. van Leeuwen, Ed.), pp. 869-941, MIT Press, Cambridge, MA, 1990.
-
(1990)
Handbook of Theoretical Computer Science
, vol.A
, pp. 869-941
-
-
Karp, R.M.1
Ramachandran, V.2
-
38
-
-
0028324717
-
Cryptographic limitations on learning Boolean formulae and finite automata
-
M. Kearns and L. Valiant, Cryptographic limitations on learning Boolean formulae and finite automata, J. Assoc. Comput. Mach. 41, No. 1 (1994), 67-95.
-
(1994)
J. Assoc. Comput. Mach.
, vol.41
, Issue.1
, pp. 67-95
-
-
Kearns, M.1
Valiant, L.2
-
40
-
-
0027627287
-
Constant depth circuits, Fourier transform, and learnability
-
N. Linial, Y. Mansour, and N. Nisan, Constant depth circuits, Fourier transform, and learnability, J. Assoc. Comput. Mach. 40, No. 3 (1993), 607-620.
-
(1993)
J. Assoc. Comput. Mach.
, vol.40
, Issue.3
, pp. 607-620
-
-
Linial, N.1
Mansour, Y.2
Nisan, N.3
-
42
-
-
0023984964
-
How to construct pseudo-random permutations and pseudo-random functions
-
M. Luby and C. Rackoff, How to construct pseudo-random permutations and pseudo-random functions, SIAM J. Comput. 17 (1988), 373-386.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
44
-
-
84947597805
-
Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
-
Springer
-
U. Maurer, Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms, in "Advances in Cryptology - CRYPTO '94," LNCS, Vol.740, pp. 271-281, Springer, 1994.
-
(1994)
Advances in Cryptology - CRYPTO '94," LNCS
, vol.740
, pp. 271-281
-
-
Maurer, U.1
-
45
-
-
0024139776
-
A key distribution system equivalent to factoring
-
K. McCurley, A key distribution system equivalent to factoring, J. of Cryptology 1 (1988), 95-105.
-
(1988)
J. of Cryptology
, vol.1
, pp. 95-105
-
-
McCurley, K.1
-
46
-
-
0003064824
-
On the construction of pseudo-random permutations: Luby-Rackoff revisited
-
M. Naor and O. Reingold, On the construction of pseudo-random permutations: Luby-Rackoff revisited, J. of Cryptology 12 (1999), 29-66.
-
(1999)
J. of Cryptology
, vol.12
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
49
-
-
0000947929
-
Pseudo-random generators for space-bounded computation
-
N. Nisan, Pseudo-random generators for space-bounded computation, Combinatorica 12, No. 4 (1992), 449-461.
-
(1992)
Combinatorica
, vol.12
, Issue.4
, pp. 449-461
-
-
Nisan, N.1
-
56
-
-
0003106775
-
Artin's conjecture for primitive roots
-
Springer-Verlag
-
M. Ram Murty, Artin's conjecture for primitive roots, in "The Mathematical Intelligencer," Vol. 10, No. 4, pp. 59-67, Springer-Verlag, 1988.
-
(1988)
The Mathematical Intelligencer
, vol.10
, Issue.4
, pp. 59-67
-
-
Ram Murty, M.1
-
59
-
-
0023985374
-
Efficient parallel pseudo-random number generation
-
J. H. Reif and J. D. Tygar, Efficient parallel pseudo-random number generation, SIAM J. Comput. 17, No. 2 (1988), 404-411.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 404-411
-
-
Reif, J.H.1
Tygar, J.D.2
-
60
-
-
0017930809
-
A method for obtaining digital signature and public key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman, A method for obtaining digital signature and public key cryptosystems, Comm. ACM 21 (1978), 120-126.
-
(1978)
Comm. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
61
-
-
38049015677
-
On the generation of cryptographically strong pseudo-random number sequences
-
A. Shamir, On the generation of cryptographically strong pseudo-random number sequences, in "ACM Trans. Comput. Sys., 1983," pp. 38-44.
-
ACM Trans. Comput. Sys., 1983
, pp. 38-44
-
-
Shamir, A.1
-
63
-
-
0009435059
-
Composite Diffie-Hellman Public-Key Generating Systems Are Hard to Break
-
Computer Science Department, Technion, Israel
-
Z. Shmuely, "Composite Diffie-Hellman Public-Key Generating Systems Are Hard to Break," Technical Report No. 356, Computer Science Department, Technion, Israel, 1985.
-
(1985)
Technical Report No. 356
, vol.356
-
-
Shmuely, Z.1
-
64
-
-
0021518106
-
A theory of the learnable
-
L. G. Valiant, A theory of the learnable, Comm. ACM 21 (1984), 1134-1142.
-
(1984)
Comm. ACM
, vol.21
, pp. 1134-1142
-
-
Valiant, L.G.1
-
65
-
-
51249175241
-
Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources
-
U. V. Vazirani, Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources, Combinatorica 7 (1987).
-
(1987)
Combinatorica
, vol.7
-
-
Vazirani, U.V.1
|