-
1
-
-
0005343811
-
Collision-resistant hashing: Toward making UOWHFs practical
-
M. Bellare and P. Rogaway. Collision-resistant hashing: toward making UOWHFs practical. Crypto '97.
-
Crypto '97
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
0038384143
-
An efficient probabilistic encryption scheme which hides all partial information
-
M. Blum and S. Goldwasser. An efficient probabilistic encryption scheme which hides all partial information. Crypto '84.
-
Crypto '84
-
-
Blum, M.1
Goldwasser, S.2
-
3
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comp., 13(4): 850-864 (1984).
-
(1984)
SIAM J. Comp.
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
6
-
-
0037708003
-
On the impossibility of constructing non-interactive statistically-secret protocols from any trapdoor one-way function
-
M. Fischlin. On the impossibility of constructing non-interactive statistically-secret protocols from any trapdoor one-way function. CT-RSA 2002.
-
(2002)
CT-RSA 2000
-
-
Fischlin, M.1
-
7
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4): 469-472 (1985).
-
(1985)
IEEE Transactions on Information Theory
, vol.1
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
8
-
-
0034496969
-
Lower bounds on the efficiency of generic cryptographic constructions
-
R. Gennaro and L. Trevisan. Lower bounds on the efficiency of generic cryptographic constructions. FOCS 2000.
-
(2000)
FOCS 2000
-
-
Gennaro, R.1
Trevisan, L.2
-
10
-
-
0035172306
-
On the impossibility of basing trapdoor functions on trapdoor predicates
-
Y. Gertner, T. Malkin, and O. Reingold. On the impossibility of basing trapdoor functions on trapdoor predicates. FOCS 2001.
-
(2001)
FOCS 2001
-
-
Gertner, Y.1
Malkin, T.2
Reingold, O.3
-
11
-
-
74049134548
-
A hard-core predicate for all one-way functions
-
O. Goldreich and L. Levin. A hard-core predicate for all one-way functions. STOC '89.
-
STOC '89
-
-
Goldreich, O.1
Levin, L.2
-
13
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen message attacks
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen message attacks. SIAM J. Comp., 17(2): 281-308 (1988).
-
(1988)
SIAM J. Comp.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
14
-
-
85029660870
-
One-way functions are essential for complexity-based cryptography
-
R. Impagliazzo and M. Luby. One-way functions are essential for complexity-based cryptography. FOCS '89.
-
FOCS '89
-
-
Impagliazzo, R.1
Luby, M.2
-
15
-
-
85066366869
-
Limits on the provable consequences of one-way permutations
-
R. Impagliazzo and S. Rudich. Limits on the provable consequences of one-way permutations. STOC '89.
-
STOC '89
-
-
Impagliazzo, R.1
Rudich, S.2
-
16
-
-
0033714443
-
A dual version of Reimer's inequality and a proof of Rudich's conjecture
-
J. Kahn, M. Saks, and C. Smyth. A dual version of Reimer's inequality and a proof of Rudich's conjecture. Computational Complexity 2000.
-
(2000)
Computational Complexity
-
-
Kahn, J.1
Saks, M.2
Smyth, C.3
-
17
-
-
0032620951
-
Limits on the efficiency of one-way permutation-based hash functions
-
J. H. Kim, D. Simon, and P. Tetali. Limits on the efficiency of one-way permutation-based hash functions. FOCS '99.
-
FOCS '99
-
-
Kim, J.H.1
Simon, D.2
Tetali, P.3
-
18
-
-
0003605145
-
Constructing digital signatures from a one-way function
-
SRI International
-
L. Lamport. Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International, 1979.
-
(1979)
Technical Report
, vol.CSL-98
-
-
Lamport, L.1
-
19
-
-
84974533327
-
Universal one-way hash functions and their cryptographic applications
-
M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. STOC '89.
-
STOC '89
-
-
Naor, M.1
Yung, M.2
-
20
-
-
0038384127
-
One-way functions are necessary and sufficient for digital signatures
-
J. Rompel. One-way functions are necessary and sufficient for digital signatures. STOC '90.
-
STOC '90
-
-
Rompel, J.1
-
22
-
-
0038384142
-
The use of interaction in public cryptosystems
-
S. Rudich. The use of interaction in public cryptosystems. Crypto '91.
-
Crypto '91
-
-
Rudich, S.1
-
23
-
-
1842461904
-
A composition theorem for universal one-way hash functions
-
V. Shoup. A composition theorem for universal one-way hash functions. Eurocrypt 2000.
-
(2000)
Eurocrypt
-
-
Shoup, V.1
-
24
-
-
0038722352
-
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
-
D. Simon. Finding collisions on a one-way street: can secure hash functions be based on general assumptions? Eurocrypt '98.
-
Eurocrypt '98
-
-
Simon, D.1
-
25
-
-
0020301290
-
Theory and applications of trapdoor functions
-
A. C. Yao. Theory and applications of trapdoor functions. FOCS '82.
-
FOCS '82
-
-
Yao, A.C.1
|