-
1
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
M. Ben-Or, S. Goldwasser, A. Wigderson, Completeness theorems for noncryptographic fault-tolerant distributed computations, in: Proc. 20th Annu. ACM Symp. on the Theory of Computing, 1988, pp. 1-10.
-
(1988)
Proc. 20th Annu. ACM Symp. on the Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
2
-
-
0018456171
-
Universal classes of hash functions
-
J. Carter, M. Wegman, Universal classes of hash functions, J. Comput. System Sci. 18 (1979) 143-154.
-
(1979)
J. Comput. System Sci.
, vol.18
, pp. 143-154
-
-
Carter, J.1
Wegman, M.2
-
3
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crepau, I. Damgard, Multiparty unconditionally secure protocols, in: Proc. 20th Annu. ACM Symp. on the Theory of Computing, 1988, pp. 11-19.
-
(1988)
Proc. 20th Annu. ACM Symp. on the Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crepau, C.2
Damgard, I.3
-
4
-
-
0009768331
-
The Byzantine generals strike again
-
D. Dolev, The Byzantine generals strike again, J. Algorithms 3 (1982) 14-30.
-
(1982)
J. Algorithms
, vol.3
, pp. 14-30
-
-
Dolev, D.1
-
5
-
-
0027341860
-
Perfectly secure message transmission
-
D. Dolev, C. Dwork, O. Waarts, M. Yung, Perfectly secure message transmission, J. ACM 40 (1) (1993) 17-47.
-
(1993)
J. ACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
6
-
-
0024091299
-
Fault tolerance in networks of bounded degree
-
C. Dwork, D. Peleg, N. Pippenger, E. Upfal, Fault tolerance in networks of bounded degree, SIAM J. Comput. 17 (5) (1988) 975-988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.5
, pp. 975-988
-
-
Dwork, C.1
Peleg, D.2
Pippenger, N.3
Upfal, E.4
-
7
-
-
0004201430
-
-
Computer Science Press, Rockville, MD
-
S. Even, Graph Algorithms, Computer Science Press, Rockville, MD, 1979.
-
(1979)
Graph Algorithms
-
-
Even, S.1
-
8
-
-
0022562351
-
Easy impossibility proofs for distributed consensus problems
-
M.J. Fischer, N.A. Lynch, M. Merritt, Easy impossibility proofs for distributed consensus problems, Distrib. Computing 1 (1) (1986) 26-39.
-
(1986)
Distrib. Computing
, vol.1
, Issue.1
, pp. 26-39
-
-
Fischer, M.J.1
Lynch, N.A.2
Merritt, M.3
-
10
-
-
0012683323
-
Special section on group communication
-
D. Powell (Guest Ed.), Special section on group communication, Comm. CACM 39 (4) (1996).
-
(1996)
Comm. CACM
, vol.39
, Issue.4
-
-
Powell, D.1
-
11
-
-
84991939136
-
LFSR-based hashing and authentication
-
Y.G. Desmedt (Ed.), Advances in Cryptology - CRYPTO '94, Springer, Berlin
-
H. Krawczyk, in: Y.G. Desmedt (Ed.), LFSR-based hashing and authentication, Advances in Cryptology - CRYPTO '94, Lecture Notes in Computer Science, vol. 839, Springer, Berlin, 1994, 129-139.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
12
-
-
84957367286
-
New hash functions for message authentication
-
L.C. Guillou, J.-J. Quisquater (Eds.), Advances in cryptology: EUROCRYPT '95, Springer, Berlin
-
H. Krawczyk, New hash functions for message authentication, in: L.C. Guillou, J.-J. Quisquater (Eds.), Advances in cryptology: EUROCRYPT '95, Lecture Notes in Computer Science, vol. 921, Springer, Berlin, 1995, pp. 301-310.
-
(1995)
Lecture Notes in Computer Science
, vol.921
, pp. 301-310
-
-
Krawczyk, H.1
-
14
-
-
0002439168
-
Allgemeinen kurventheorie
-
K. Menger, Allgemeinen kurventheorie, Fund. Math. 10 (1997) 96-115.
-
(1997)
Fund. Math.
, vol.10
, pp. 96-115
-
-
Menger, K.1
-
15
-
-
84976810569
-
Reaching agreements in the presence of faults
-
M. Pease, R. Shostak, L. Lamport, Reaching agreements in the presence of faults, J. ACM 27 (2): 228-234. (1980).
-
(1980)
J. ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
17
-
-
0003038453
-
A survey of information authentication
-
G.J. Simmons (Ed.), IEEE Press, New York
-
G.J. Simmons, A survey of information authentication, in: G.J. Simmons (Ed.), Contemporary Cryptology, The Science of Information Integrity, IEEE Press, New York, 1992, pp. 441-497.
-
(1992)
Contemporary Cryptology, the Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.J.1
-
18
-
-
0012609620
-
Tolerating a linear number of faults in networks of bounded degree
-
E. Upfal, Tolerating a linear number of faults in networks of bounded degree, Inform. and Comput. 115 (2) (1994) 312-320.
-
(1994)
Inform. and Comput.
, vol.115
, Issue.2
, pp. 312-320
-
-
Upfal, E.1
-
19
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. Wegman, J. Carter, New hash functions and their use in authentication and set equality, J. Comput. System Sci. 22 (1981) 265-279.
-
(1981)
J. Comput. System Sci.
, vol.22
, pp. 265-279
-
-
Wegman, M.1
Carter, J.2
|