-
1
-
-
0031334110
-
-
pp. 374-383.
-
M. Bellare, R. Impagliazzo, and M. Naor, Does Parallel Repetition Lower the Error in Computationally Convincing Protocols?, Proc. 38th Symp. on Foundations of Computer Science, 1997, pp. 374-383.
-
R. Impagliazzo, and M. Naor, Does Parallel Repetition Lower the Error in Computationally Convincing Protocols?, Proc. 38th Symp. on Foundations of Computer Science, 1997
-
-
Bellare, M.1
-
2
-
-
0025174457
-
-
pp. 494-502.
-
M. Bellare, S. Micali, and R. Ostrovsky, The (True) Complexity of Statistical Zero Knowledge, Proc. 2\st ACM Symp. on Theory of Computing, 1990, pp. 494-502.
-
S. Micali, and R. Ostrovsky, the (True) Complexity of Statistical Zero Knowledge, Proc. 2\st ACM Symp. on Theory of Computing, 1990
-
-
Bellare, M.1
-
3
-
-
0021522644
-
-
pp. 850-864.
-
M. Blum and S. Micali, How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits, SIAMJ. Comput., vol. 13, 1984, pp. 850-864.
-
How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits, SIAMJ. Comput., Vol. 13, 1984
-
-
Blum, M.1
Micali, S.2
-
4
-
-
0025056443
-
-
pp. 63-76.
-
J. Boyar, S. Kurtz, and M. Krental, A Discrete Logarithm Implementation of Perfect Zero-Knowledge Blobs, J. Cryplology, vol. 2,1990, pp. 63-76.
-
S. Kurtz, and M. Krental, A Discrete Logarithm Implementation of Perfect Zero-Knowledge Blobs, J. Cryplology, Vol. 2,1990
-
-
Boyar, J.1
-
6
-
-
0000867507
-
-
pp. 156-189.
-
G. Brassard, D. Chaum, and C. Crépeau, Minimum Disclosure Proofs of Knowledge,J. Computer System Sä., vol. 37, 1988, pp. 156-189.
-
D. Chaum, and C. Crépeau, Minimum Disclosure Proofs of Knowledge,J. Computer System Sä., Vol. 37, 1988
-
-
Brassard, G.1
-
7
-
-
84931031941
-
-
pp. 94-107.
-
G. Brassard and M. Yung, One-Way Group Action, Advances in Cryptology-Crypto '90, Lecture Notes in Computer Science 537, Springer-Verlag, Berlin, 1991, pp. 94-107.
-
One-Way Group Action, Advances in Cryptology-Crypto '90, Lecture Notes in Computer Science 537, Springer-Verlag, Berlin, 1991
-
-
Brassard, G.1
Yung, M.2
-
8
-
-
84947955350
-
-
pp. 470-484.
-
D. Chaum, E. van Heijst, and B. Pfitzmann, Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer, Advances in Cryptology-Crypto '91, Lecture Notes in Computer Science 576, Springer-Verlag, Berlin, 1992, pp. 470-484.
-
E. Van Heijst, and B. Pfitzmann, Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer, Advances in Cryptology-Crypto '91, Lecture Notes in Computer Science 576, Springer-Verlag, Berlin, 1992
-
-
Chaum, D.1
-
9
-
-
85034174617
-
-
pp. 203-216.
-
I. Damgard, Collision Free Hash Functions and Public Key Signatures Schemes, Advances in Cryptology-Eurocrypt '87, Lecture Notes in Computer Science 293, Springer-Verlag, Berlin, 1988, pp. 203-216.
-
Collision Free Hash Functions and Public Key Signatures Schemes, Advances in Cryptology-Eurocrypt '87, Lecture Notes in Computer Science 293, Springer-Verlag, Berlin, 1988
-
-
Damgard, I.1
-
10
-
-
84957052653
-
-
pp. 100-109.
-
I. Damgard, P. Landrock, and C. Pomerance, Interactive Hashing Can Simplify Zero-Knowledge Protocol Design without Complexity Assumptions, Advances in Cryptology - Crypto '93, Lecture Notes in Computer Science 773, Springer-Verlag, Berlin, 1994, pp. 100-109.
-
P. Landrock, and C. Pomerance, Interactive Hashing Can Simplify Zero-Knowledge Protocol Design Without Complexity Assumptions, Advances in Cryptology - Crypto '93, Lecture Notes in Computer Science 773, Springer-Verlag, Berlin, 1994
-
-
Damgard, I.1
-
11
-
-
85016692748
-
-
pp. 250-265.
-
I. Damgard, T. Pedersen, and B. Pfitzmann, On the Existence of Statistically Hiding Bit Commitment and Fail Stop Signature, Advances in Cryptology-Crypto '93, Lecture Notes in Computer Science 773, Springer-Verlag, Berlin, 1994, pp. 250-265.
-
T. Pedersen, and B. Pfitzmann, on the Existence of Statistically Hiding Bit Commitment and Fail Stop Signature, Advances in Cryptology-Crypto '93, Lecture Notes in Computer Science 773, Springer-Verlag, Berlin, 1994
-
-
Damgard, I.1
-
13
-
-
85034162910
-
-
1995. Electronic publication: http://www.eccc.uni-trier.de/eccc/info/ECCC-Books/eccc-books.html (Electronic Colloquium on Computational Complexity).
-
O. Goldreich, Foundations of Cryptography (Fragments of a Book), 1995. Electronic publication: http://www.eccc.uni-trier.de/eccc/info/ECCC-Books/eccc-books.html (Electronic Colloquium on Computational Complexity).
-
Foundations of Cryptography (Fragments of A Book)
-
-
Goldreich, O.1
-
14
-
-
0026367257
-
-
pp. 447-457.
-
O. Goldreich, S. Goldwasser, and N. Linial, Fault Tolerant Computation in the Full Information Model, Siam J. Comput., to appear. Extended abstract: Proc. IEEE 32nd Symp. on Foundations of Computer Science, 1991, pp. 447-457.
-
S. Goldwasser, and N. Linial, Fault Tolerant Computation in the Full Information Model, Siam J. Comput., to Appear. Extended Abstract: Proc. IEEE 32nd Symp. on Foundations of Computer Science, 1991
-
-
Goldreich, O.1
-
15
-
-
0025742358
-
-
pp. 318-326.
-
O. Goldreich, R. Impagliazzo, L. Levin, R. Venkatesan, and D. Zuckerman, Security Preserving Amplification of Hardness, Proc. IEEE 31 st Symp. on Foundations of Computer Science, 1990, pp. 318-326.
-
R. Impagliazzo, L. Levin, R. Venkatesan, and D. Zuckerman, Security Preserving Amplification of Hardness, Proc. IEEE 31 St Symp. on Foundations of Computer Science, 1990
-
-
Goldreich, O.1
-
16
-
-
0027797493
-
-
pp. 1163-1175.
-
O. Goldreich, H. Krawczyk, and M. Luby, On the Existence of Pseudo-Random Generators, SIAM J. Comput., vol. 22, 1993, pp. 1163-1175.
-
H. Krawczyk, and M. Luby, on the Existence of Pseudo-Random Generators, SIAM J. Comput., Vol. 22, 1993
-
-
Goldreich, O.1
-
18
-
-
71149116146
-
-
pp. 691-729.
-
O. Goldreich, S. Micali, and A. Wigderson, Proofs That Yield Nothing but Their Validity or All Languages in NP Have Zero Knowledge Proof Systems, J. Assoc. Comput. Mach., vol. 38, 1991, pp. 691-729.
-
S. Micali, and A. Wigderson, Proofs That Yield Nothing but Their Validity or All Languages in NP Have Zero Knowledge Proof Systems, J. Assoc. Comput. Mach., Vol. 38, 1991
-
-
Goldreich, O.1
-
19
-
-
0024611659
-
-
pp. 186-208.
-
S. Goldwasser, S. Micali, and C. Rackoff, The Knowledge Complexity of Interactive Proof-Systems, SIAMJ. Comput., vol. 18, 1989, pp. 186-208.
-
S. Micali, and C. Rackoff, the Knowledge Complexity of Interactive Proof-Systems, SIAMJ. Comput., Vol. 18, 1989
-
-
Goldwasser, S.1
-
21
-
-
0024866111
-
-
pp. 12-24.
-
I. Impagliazzo, L. Levin, and M. Luby, Pseudo-Random Generation from One-Way Functions, Proc. 21 st ACM Symp. on Theory of Computing, 1989, pp. 12-24.
-
L. Levin, and M. Luby, Pseudo-Random Generation from One-Way Functions, Proc. 21 St ACM Symp. on Theory of Computing, 1989
-
-
Impagliazzo, I.1
-
23
-
-
0001143795
-
-
pp. 199-216.
-
R. Impagliazzo and M. Naor, Efficient Cryptographic Schemes Provably as Secure as Subset-Sum, J. Cryplology, vol. 9, 1996, pp. 199-216.
-
Efficient Cryptographic Schemes Provably As Secure As Subset-Sum, J. Cryplology, Vol. 9, 1996
-
-
Impagliazzo, R.1
Naor, M.2
-
24
-
-
85028775577
-
-
pp. 40-51.
-
R. Impagliazzo and M. Yung, Direct Minimum-Knowledge Computations, Advances in CryplologyCrypto '87, Lecture Notes in Computer Science 293, Springer-Verlag, Berlin, 1988, pp. 40-51.
-
Direct Minimum-Knowledge Computations, Advances in CryplologyCrypto '87, Lecture Notes in Computer Science 293, Springer-Verlag, Berlin, 1988
-
-
Impagliazzo, R.1
Yung, M.2
-
32
-
-
85034159516
-
-
pp. 418-429.
-
R. Ostrovsky, R. Venkatesan, and M. Yung, Fair Games Against an All-Powerful Adversary, in Sequences '91 : Methods in Communication, Security and Computer Science, edited by R. Capocelli, A. De Santis, and U. Vaccaro, Springer-Verlag, Berlin, 1993, pp. 418-429.
-
R. Venkatesan, and M. Yung, Fair Games Against An All-Powerful Adversary, in Sequences '91 : Methods in Communication, Security and Computer Science, Edited by R. Capocelli, A. de Santis, and U. Vaccaro, Springer-Verlag, Berlin, 1993
-
-
Ostrovsky, R.1
-
33
-
-
85028762469
-
-
pp. 439-448.
-
R. Ostrovsky, R. Venkatesan, and M. Yung, Secure Commitment Against a Powerful Adversary, Proc. STACS 92, Lecture Notes in Computer Science 577, Springer-Verlag, Berlin, 1992, pp. 439-448.
-
R. Venkatesan, and M. Yung, Secure Commitment Against A Powerful Adversary, Proc. STACS 92, Lecture Notes in Computer Science 577, Springer-Verlag, Berlin, 1992
-
-
Ostrovsky, R.1
-
34
-
-
84949022452
-
-
pp. 267-273.
-
R. Ostrovsky, R. Venkatesan, and M. Yung, Interactive Hashing Simplifies Zero-Knowledge Protocol Design, Advance in Cryptology-Eurocrypt '93, Lecture Notes in Computer Science 765, Springer-Verlag, Berlin, 1994, pp. 267-273.
-
R. Venkatesan, and M. Yung, Interactive Hashing Simplifies Zero-Knowledge Protocol Design, Advance in Cryptology-Eurocrypt '93, Lecture Notes in Computer Science 765, Springer-Verlag, Berlin, 1994
-
-
Ostrovsky, R.1
|