-
1
-
-
0027576476
-
Coin-flipping games immune against linear-sized coalitions
-
N. ALON AND M. NAOR, Coin-flipping games immune against linear-sized coalitions, SIAM J. Comput., 22 (1993), pp. 403-417.
-
(1993)
SIAM J. Comput.
, vol.22
, pp. 403-417
-
-
Alon, N.1
Naor, M.2
-
2
-
-
0024769014
-
Distributed computation with faulty majority
-
IEEE Computer Society Press, Los Alamitos, CA
-
D. BEAVER AND S. GOLDWASSER, Distributed computation with faulty majority, in Proc. 30th Annual IEEE Symp. on Foundations of Computing, IEEE Computer Society Press, Los Alamitos, CA, 1989, pp. 468-473.
-
(1989)
Proc. 30th Annual IEEE Symp. on Foundations of Computing
, pp. 468-473
-
-
Beaver, D.1
Goldwasser, S.2
-
3
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
ACM, New York
-
M. BEN-OR, S. GOLDWASSER, AND A. WIGDERSON, Completeness theorems for non-cryptographic fault-tolerant distributed computation, in Proc. 20th Annual ACM Symp. on Theory of Computing, ACM, New York, 1988, pp. 1-10.
-
(1988)
Proc. 20th Annual ACM Symp. on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
0002897287
-
Collective coin flipping
-
S. Micali, ed., JAI Press, Greenwich, CT
-
M. BEN-OR AND N. LINIAL, Collective coin flipping, in Randomness and Computation, S. Micali, ed., JAI Press, Greenwich, CT, 1989, pp. 91-115.
-
(1989)
Randomness and Computation
, pp. 91-115
-
-
Ben-Or, M.1
Linial, N.2
-
5
-
-
0012726585
-
Collective coin flipping and other models of imperfect randomness
-
Combinatorics Eger
-
M. BEN-OR, N. LINIAL, AND M. SAKS, Collective coin flipping and other models of imperfect randomness, Colloq, Math Soc. János Bolyai 52, Combinatorics Eger 1987, pp. 75-112.
-
(1987)
Colloq, Math Soc. János Bolyai
, vol.52
, pp. 75-112
-
-
Ben-Or, M.1
Linial, N.2
Saks, M.3
-
6
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
B. CHOR AND O. GOLDREICH, Unbiased bits from sources of weak randomness and probabilistic communication complexity, SIAM J. Comput., 17 (1988), pp. 230-261.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
7
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
ACM, New York
-
D. CHAUM, C. CREPEAU, AND I. DAMGÅRD, Multiparty unconditionally secure protocols, in Proc. of 20th Annual ACM Symp. on Theory of Computing, ACM, New York, 1988, pp. 11-19.
-
(1988)
Proc. of 20th Annual ACM Symp. on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgård, I.3
-
9
-
-
0027206125
-
Fast perfect-information leader election protocol with linear immunity
-
San Diego, ACM, New York; Combinatorica, to appear
-
J. COOPER AND N. LINIAL, Fast perfect-information leader election protocol with linear immunity, in 25th Annual ACM Symposium on the Theory of Computing, San Diego, ACM, New York, 1993, pp. 662-671; Combinatorica, to appear.
-
(1993)
25th Annual ACM Symposium on the Theory of Computing
, pp. 662-671
-
-
Cooper, J.1
Linial, N.2
-
10
-
-
84957052653
-
Interactive hashing can simplify zero-knowledge protocol design without computational assumptions
-
Advances in Cryptology, Proceedings of Crypto93, Springer-Verlag, New York
-
I. DAMGÅRD, Interactive hashing can simplify zero-knowledge protocol design without computational assumptions, in Advances in Cryptology, Proceedings of Crypto93, Lecture Notes in Computer Science 773, Springer-Verlag, New York, 1983, pp. 100-109.
-
(1983)
Lecture Notes in Computer Science
, vol.773
, pp. 100-109
-
-
Damgård, I.1
-
11
-
-
84976655650
-
Cryptographic computation: Secure faulty-tolerant protocols and the public key model
-
Advances in Cryptology, Proceedings of Crypto87, Springer-Verlag, New York
-
Z. GALIL, S. HABER, AND M. YUNG, Cryptographic computation: Secure faulty-tolerant protocols and the public key model, in Advances in Cryptology, Proceedings of Crypto87, Lecture Notes in Computer Science 293, Springer-Verlag, New York, 1987, pp. 135-155.
-
(1987)
Lecture Notes in Computer Science
, vol.293
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, A.M.3
-
12
-
-
85034479527
-
Fault-tolerant Computation in the Full Information Model
-
Computer Science Dept., Technion, Haifa, Israel, July
-
O. GOLDREICH, S. GOLDWASSER, AND N. LINIAL, Fault-tolerant Computation in the Full Information Model, Tech. report TR-682, Computer Science Dept., Technion, Haifa, Israel, July 1991.
-
(1991)
Tech. Report
, vol.TR-682
-
-
Goldreich, O.1
Goldwasser, S.2
Linial, N.3
-
13
-
-
71149116146
-
Proofs that yield nothing but their validity and a methodology for cryptographic protocol design
-
O. GOLDREICH, S. MICALI, AND A. WIGDERSON, Proofs that yield nothing but their validity and a methodology for cryptographic protocol design, J. Assoc. Comput. Mach., 38 (1991), pp. 691-729.
-
(1991)
J. Assoc. Comput. Mach.
, vol.38
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
0023545076
-
How to play any mental game
-
ACM, New York
-
O. GOLDREICH, S. MICALI, AND A. WIGDERSON, How to play any mental game, in Proc. 19th Annual ACM Symp. on Theory of Computing, ACM, New York, 1987, pp. 218-229.
-
(1987)
Proc. 19th Annual ACM Symp. on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
15
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Advances in Cryptology, Proceedings of Crypto90, Springer-Verlag, New York
-
S. GOLDWASSER AND L. A. LEVIN, Fair computation of general functions in presence of immoral majority, in Advances in Cryptology, Proceedings of Crypto90, Lecture Notes in Computer Science 537, Springer-Verlag, New York, 1990, pp. 77-93.
-
(1990)
Lecture Notes in Computer Science
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.A.2
-
16
-
-
0024140061
-
The influence of variables on boolean functions
-
IEEE Computer Society Press, Los Alamitos, CA
-
J. KAHN, G. KALAI, AND N. LINIAL, The influence of variables on boolean functions, in 29th Annual IEEE Symp. on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1988, pp. 68-80.
-
(1988)
29th Annual IEEE Symp. on Foundations of Computer Science
, pp. 68-80
-
-
Kahn, J.1
Kalai, G.2
Linial, N.3
-
18
-
-
84958615425
-
Perfect zero-knowledge arguments for NP can be based on general complexity assumptions
-
Advances in Cryptology, Proceedings of Crypto92, Springer-Verlag, New York
-
M. NAOR, R. OSTROVSKY, R. VENKATESAN, AND M. YUNG, Perfect zero-knowledge arguments for NP can be based on general complexity assumptions, in Advances in Cryptology, Proceedings of Crypto92, Lecture Notes in Computer Science 740, Springer-Verlag, New York, 1992; J. Cryptology, to appear.
-
(1992)
Lecture Notes in Computer Science
, vol.740
-
-
Naor, M.1
Ostrovsky, R.2
Venkatesan, R.3
Yung, M.4
-
19
-
-
85034469386
-
-
to appear
-
M. NAOR, R. OSTROVSKY, R. VENKATESAN, AND M. YUNG, Perfect zero-knowledge arguments for NP can be based on general complexity assumptions, in Advances in Cryptology, Proceedings of Crypto92, Lecture Notes in Computer Science 740, Springer-Verlag, New York, 1992; J. Cryptology, to appear.
-
J. Cryptology
-
-
-
20
-
-
0028062297
-
Simple and efficient leader election in the full information model
-
ACM, New York
-
R. OSTROVSKY, S. RAJAGOPALAN, AND U. VAZIRANI, Simple and efficient leader election in the full information model, in Proc. 26th Annual ACM Symp. on Theory of Computing, ACM, New York, 1994, pp. 234-242.
-
(1994)
Proc. 26th Annual ACM Symp. on Theory of Computing
, pp. 234-242
-
-
Ostrovsky, R.1
Rajagopalan, S.2
Vazirani, U.3
-
21
-
-
1542660671
-
Fair games against an all-powerful adversary
-
Jin-Yi Cai ed., AMS, Providence, RI
-
R. OSTROVSKY, R. VENKATESAN, AND M. YUNG, Fair games against an all-powerful adversary, in DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Vol. 13, Jin-Yi Cai ed., AMS, Providence, RI, 1993, pp. 155-169.
-
(1993)
DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, vol.13
, pp. 155-169
-
-
Ostrovsky, R.1
Venkatesan, R.2
Yung, M.3
-
22
-
-
84949022452
-
Interactive hashing simplifies zero-knowledge protocol design
-
Proc. Eurocrypt93, Springer-Verlag, New York
-
R. OSTROVSKY, R. VENKATESAN, AND M. YUNG, Interactive hashing simplifies zero-knowledge protocol design, in Proc. Eurocrypt93, Lecture Notes in Computer Science 765, Springer-Verlag, New York, 1983, pp. 267-273.
-
(1983)
Lecture Notes in Computer Science
, vol.765
, pp. 267-273
-
-
Ostrovsky, R.1
Venkatesan, R.2
Yung, M.3
-
23
-
-
0021546972
-
Generating quasi-random sequences from slightly-random sources
-
IEEE Computer Society Press, Los Alamitos, CA
-
M. SANTHA AND U. V. VAZIRANI, Generating quasi-random sequences from slightly-random sources, in 25th Annual IEEE Symp. on Foundation of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1984, pp. 434-440.
-
(1984)
25th Annual IEEE Symp. on Foundation of Computer Science
, pp. 434-440
-
-
Santha, M.1
Vazirani, U.V.2
-
24
-
-
0022252339
-
Random polynomial time is equal to slightly-random polynomial time
-
IEEE Computer Society Press, Los Alamitos, CA
-
U. V. VAZIRANI AND V. V. VAZIRANI, Random polynomial time is equal to slightly-random polynomial time, in 26th Annual IEEE Symp. on Foundation of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1985, pp. 417-428.
-
(1985)
26th Annual IEEE Symp. on Foundation of Computer Science
, pp. 417-428
-
-
Vazirani, U.V.1
Vazirani, V.V.2
|