-
2
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction
-
J. Bar-Ilan, D. Beaver. Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction. In PODC, pages 201-209, 1989
-
(1989)
PODC
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
3
-
-
33746365751
-
Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty minority
-
D. Beaver. Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty minority. J. of Cryptology, 4:75-122, 1991
-
(1991)
J. of Cryptology
, vol.4
, pp. 75-122
-
-
Beaver, D.1
-
4
-
-
0025137207
-
The round complexity of secure protocols
-
D. Beaver, S. Micali, P. Rogaway. The round complexity of secure protocols. In STOC, pages 503-513, 1990
-
(1990)
STOC
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
5
-
-
33746087022
-
Fast asynchronous Byzantine agreement
-
M. Ben-Or. Fast asynchronous Byzantine agreement. In PODC, pages 149-151, 1985
-
(1985)
PODC
, pp. 149-151
-
-
Ben-Or, M.1
-
6
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In STOC, pages 1-10, 1988
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
0011797655
-
An asynchronous (n - 1)/3-resilient consensus protocol
-
G. Bracha. An asynchronous (n - 1)/3-resilient consensus protocol. In PODC, pages 154-162, 1984
-
(1984)
PODC
, pp. 154-162
-
-
Bracha, G.1
-
8
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. J. of Cryptology, 13(1):143-202, 1991 online version at http://philby.ucsd.edu/cryptolib/1998/98-18.html.
-
(1991)
J. of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
9
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In FOCS, 2001
-
(2001)
FOCS
-
-
Canetti, R.1
-
10
-
-
0027313816
-
Fast asynchronous Byzantine agreement with optimal resilience
-
R. Canetti, T. Rabin. Fast asynchronous Byzantine agreement with optimal resilience. In STOC, pages 42-51, 1993. Updated version: http://www.research.ibm.com/security/cr-ba.ps
-
(1993)
STOC
, pp. 42-51
-
-
Canetti, R.1
Rabin, T.2
-
11
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crépeau, I. Damgård. Multiparty unconditionally secure protocols. In STOC, pages 11-19, 1988
-
(1988)
STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
14
-
-
0031210863
-
An optimal probabilistic protocol for synchronous Byzantine agreement
-
A preliminary version of this paper appeared at STOC 1988
-
P. Feldman, S. Micali. An optimal probabilistic protocol for synchronous Byzantine agreement. SIAM Journal on Computing, 26(4):873-933, 1997. A preliminary version of this paper appeared at STOC 1988
-
(1997)
SIAM Journal on Computing
, vol.26
, Issue.4
, pp. 873-933
-
-
Feldman, P.1
Micali, S.2
-
15
-
-
0348228510
-
Collective coin tossing without assumptions nor broadcasting
-
S. Micali, T. Rabin. Collective coin tossing without assumptions nor broadcasting. In CRYPTO, pages 253-266, 1990
-
(1990)
CRYPTO
, pp. 253-266
-
-
Micali, S.1
Rabin, T.2
-
16
-
-
84974655726
-
Secure computation
-
S. Micali, P. Rogaway. Secure computation. In CRYPTO, pages 392-404, 1991
-
(1991)
CRYPTO
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
17
-
-
84976810569
-
Reaching agreement in the presence of faults
-
M. Pease, R. Shostak, L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2): 191-205, 1980
-
(1980)
Journal of the ACM
, vol.27
, Issue.2
, pp. 191-205
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
18
-
-
0021372186
-
Extending binary byzantine agreement to multivalued byzantine agreement
-
R. Turpin, B.A. Coan. extending binary byzantine agreement to multivalued byzantine agreement. Information Processing Letters, 18:73-76, 1984
-
(1984)
Information Processing Letters
, vol.18
, pp. 73-76
-
-
Turpin, R.1
Coan, B.A.2
|