-
1
-
-
0002128548
-
The influence of large coalitions
-
M. Ajtai and N. Linial. The influence of large coalitions. Combinatorica, 13(2): 129-145, 1993.
-
(1993)
Combinatorica
, vol.13
, Issue.2
, pp. 129-145
-
-
Ajtai, M.1
Linial, N.2
-
2
-
-
0023995534
-
Arthur-Merlin games: A randomized proof system and a hierarchy of complexity classes
-
L. Babai and S. Moran. Arthur-Merlin games: A randomized proof system and a hierarchy of complexity classes. J. Comput. Syst. Sci., 36(2):254-276, 1988.
-
(1988)
J. Comput. Syst. Sci.
, vol.36
, Issue.2
, pp. 254-276
-
-
Babai, L.1
Moran, S.2
-
4
-
-
84957064831
-
The all-or-nothing nature of two-party secure computation
-
A. Beimel, T. Malkin, and S. Micali. The all-or-nothing nature of two-party secure computation. In Proc. CRYPTO '99, pages 80-97, 1999.
-
(1999)
Proc. CRYPTO '99
, pp. 80-97
-
-
Beimel, A.1
Malkin, T.2
Micali, S.3
-
5
-
-
0040713388
-
Randomness in interactive proofs
-
M. Bellare, O. Goldreich, and S. Goldwasser. Randomness in interactive proofs. Comput. Complex., 3(4):319-354, 1993.
-
(1993)
Comput. Complex.
, vol.3
, Issue.4
, pp. 319-354
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
6
-
-
33749228136
-
Randomness-efficient oblivious sampling
-
M. Bellare and J. Rompel. Randomness-efficient oblivious sampling. In Proc. 35th FOCS, pages 276-287, 1994.
-
(1994)
Proc. 35th FOCS
, pp. 276-287
-
-
Bellare, M.1
Rompel, J.2
-
7
-
-
0009583632
-
Everything provable is provable in zero-knowledge
-
M. Ben-Or, O. Goldreich, S. Goldwasser, J. Hȧstad, J. Kilian, S. Micali, and P. Rogaway. Everything provable is provable in zero-knowledge. In Proc. CRYPTO '88, pages 37-56, 1988.
-
(1988)
Proc. CRYPTO '88
, pp. 37-56
-
-
Ben-Or, M.1
Goldreich, O.2
Goldwasser, S.3
Hastad, J.4
Kilian, J.5
Micali, S.6
Rogaway, P.7
-
8
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert. Privacy amplification by public discussion. SIAM J. Comput., 17(2):210-229, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
9
-
-
51249178917
-
Independent unbiased coin flips from a correlated biased source - A finite state Markov chain
-
M. Blum. Independent unbiased coin flips from a correlated biased source - a finite state Markov chain. Combinatoria, 6(2):97-108, 1986.
-
(1986)
Combinatoria
, vol.6
, Issue.2
, pp. 97-108
-
-
Blum, M.1
-
10
-
-
0003153237
-
Non-interactive zero-knowledge and its applications
-
M. Blum, P. Feldman, and S. Micali. Non-interactive zero-knowledge and its applications. In Proc. 20th STOC, pages 103-112, 1988.
-
(1988)
Proc. 20th STOC
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
11
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz, and A. Sahai. Exposure-resilient functions and all-or-nothing transforms. In Proc. EUROCRYPT '00, pages 453-469, 2000.
-
(2000)
Proc. EUROCRYPT '00
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
12
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
B. Chor and O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput., 17(2):230-261, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
13
-
-
0022198802
-
The bit extraction problem of t-resilient functions
-
IEEE
-
B. Chor, O. Goldreich, J. Hastad, J. Friedman, S. Rudich, and R. Smolensky. The bit extraction problem of t-resilient functions. In Proc. 26th FOCS, pages 396-407. IEEE, 1985.
-
(1985)
Proc. 26th FOCS
, pp. 396-407
-
-
Chor, B.1
Goldreich, O.2
Hastad, J.3
Friedman, J.4
Rudich, S.5
Smolensky, R.6
-
15
-
-
30744451262
-
On extracting private randomness over a public channel
-
Y. Dodis and R. Oliveira. On extracting private randomness over a public channel. In Proc. RANDOM '03, pages 252-263, 2003.
-
(2003)
Proc. RANDOM '03
, pp. 252-263
-
-
Dodis, Y.1
Oliveira, R.2
-
16
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Proc. EUROCRYPT '04, pages 523-540, 2004.
-
(2004)
Proc. EUROCRYPT '04
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
17
-
-
84945116168
-
On perfect and adaptive security in exposure-resilient cryptography
-
Y. Dodis, A. Sahai, and A. Smith. On perfect and adaptive security in exposure-resilient cryptography. In Proc. EUROCRYPT '01, pages 301-324, 2001.
-
(2001)
Proc. EUROCRYPT '01
, pp. 301-324
-
-
Dodis, Y.1
Sahai, A.2
Smith, A.3
-
18
-
-
0036957025
-
On the (non)universality of the one-time pad
-
Y. Dodis and J. Spencer. On the (non)universality of the one-time pad. In Proc. 43rd FOCS, pages 376-388, 2002.
-
(2002)
Proc. 43rd FOCS
, pp. 376-388
-
-
Dodis, Y.1
Spencer, J.2
-
19
-
-
0012578418
-
The efficient construction of an unbiased random sequence
-
P. Elias. The efficient construction of an unbiased random sequence. Ann. Math. Stat., 43(2):865-870, 1972.
-
(1972)
Ann. Math. Stat.
, vol.43
, Issue.2
, pp. 865-870
-
-
Elias, P.1
-
20
-
-
0342733642
-
Multiple non-interactive zero knowledge proofs under general assumptions
-
U. Feige, D. Lapidot, and A. Shamir. Multiple non-interactive zero knowledge proofs under general assumptions. SIAM J. Comput., 29(1): 1-28, 1999.
-
(1999)
SIAM J. Comput.
, vol.29
, Issue.1
, pp. 1-28
-
-
Feige, U.1
Lapidot, D.2
Shamir, A.3
-
21
-
-
0003979335
-
-
Cambridge University Press, Cambridge, Basic applications
-
O. Goldreich. Foundations of cryptography, volume 2. Cambridge University Press, Cambridge, 2004. Basic applications.
-
(2004)
Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
22
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or A completeness theorem for protocols with honest majority. In Proc. 19th STOC, pages 218-229, 1987.
-
(1987)
Proc. 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
23
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM, 38(1):691-729, 1991.
-
(1991)
J. ACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
24
-
-
0028676264
-
Definitions and properties of zero-knowledge proof systems
-
O. Goldreich and Y. Oren. Definitions and properties of zero-knowledge proof systems. J. Cryptology, 7(1): 1-32, 1994.
-
(1994)
J. Cryptology
, vol.7
, Issue.1
, pp. 1-32
-
-
Goldreich, O.1
Oren, Y.2
-
25
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. Comput., 18(1):186-208, 1989.
-
(1989)
SIAM J. Comput.
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
26
-
-
0001796243
-
Private coins versus public coins in interactive proof systems
-
S. Goldwasser and M. Sipser. Private coins versus public coins in interactive proof systems. Advances in Computing Research, 5:73-90, 1989.
-
(1989)
Advances in Computing Research
, vol.5
, pp. 73-90
-
-
Goldwasser, S.1
Sipser, M.2
-
27
-
-
85028775577
-
Direct minimum-knowledge computations
-
R. Impagliazzo and M. Yung. Direct minimum-knowledge computations. In Proc. CRYPTO '87, pages 40-51, 1987.
-
(1987)
Proc. CRYPTO '87
, pp. 40-51
-
-
Impagliazzo, R.1
Yung, M.2
-
28
-
-
0344981502
-
Deterministic extractors for bit-fixing sources and exposure-resilient cryptography
-
J. Kamp and D. Zuckerman. Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. In Proc. 35th FOCS, pages 92-101, 2003.
-
(2003)
Proc. 35th FOCS
, pp. 92-101
-
-
Kamp, J.1
Zuckerman, D.2
-
29
-
-
84937425036
-
A new aspect for security notions: Secure randomness in public-key encryption schemes
-
T. Koshiba. A new aspect for security notions: Secure randomness in public-key encryption schemes. In Proc. 4th PKC, pages 87-103, 2001.
-
(2001)
Proc. 4th PKC
, pp. 87-103
-
-
Koshiba, T.1
-
30
-
-
84958973302
-
On sufficient randomness for secure public-key cryptosystems
-
T. Koshiba. On sufficient randomness for secure public-key cryptosystems. In Proc. 5th PKC, pages 34-47, 2002.
-
(2002)
Proc. 5th PKC
, pp. 34-47
-
-
Koshiba, T.1
-
31
-
-
0012523366
-
Some extremal problems arising from discrete control processes
-
D. Lichtenstein, N. Linial, and M. Saks. Some extremal problems arising from discrete control processes. Combinatorica, 9(3):269-287, 1989.
-
(1989)
Combinatorica
, vol.9
, Issue.3
, pp. 269-287
-
-
Lichtenstein, D.1
Linial, N.2
Saks, M.3
-
32
-
-
0038446831
-
Extractors: Optimal up to constant factors
-
C.-J. Lu, O. Reingold, S. Vadhan, and A. Wigderson. Extractors: optimal up to constant factors. In Proc. 35th STOC, pages 602-611, 2003.
-
(2003)
Proc. 35th STOC
, pp. 602-611
-
-
Lu, C.-J.1
Reingold, O.2
Vadhan, S.3
Wigderson, A.4
-
33
-
-
0026930922
-
Algebraic methods for interactive proof systems
-
C. Lund, L. Fortnow, H. Karloff, and N. Nisan. Algebraic methods for interactive proof systems. J. ACM, 39(4):859-868, 1992.
-
(1992)
J. ACM
, vol.39
, Issue.4
, pp. 859-868
-
-
Lund, C.1
Fortnow, L.2
Karloff, H.3
Nisan, N.4
-
34
-
-
84958670019
-
Privacy amplification secure against active adversaries
-
U. Maurer and S. Wolf. Privacy amplification secure against active adversaries. In Proc. CRYPTO '97, pages 307-321, 1997.
-
(1997)
Proc. CRYPTO '97
, pp. 307-321
-
-
Maurer, U.1
Wolf, S.2
-
35
-
-
84977114496
-
On the impossibility of private key cryptography with weakly random keys
-
J. L. McInnes and B. Pinkas. On the impossibility of private key cryptography with weakly random keys. In Proc. CRYPTO '90, pages 421-436, 1991.
-
(1991)
Proc. CRYPTO '90
, pp. 421-436
-
-
McInnes, J.L.1
Pinkas, B.2
-
36
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. In Proc. 21th STOC, pages 33-43, 1988.
-
(1988)
Proc. 21th STOC
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
37
-
-
0030086632
-
Randomness is linear in space
-
N. Nisan and D. Zuckerman. Randomness is linear in space. J. Comput. Syst. Sci., 52(1):43-52, 1996.
-
(1996)
J. Comput. Syst. Sci.
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
39
-
-
35048874991
-
Unconditional authenticity and privacy from an arbitrarily weak secret
-
R. Renner and S. Wolf. Unconditional authenticity and privacy from an arbitrarily weak secret. In Proc. CRYPTO '03, pages 78-95, 2003.
-
(2003)
Proc. CRYPTO '03
, pp. 78-95
-
-
Renner, R.1
Wolf, S.2
-
40
-
-
0021469810
-
Generating quasi-random sequences from semi-random sources
-
M. Santha and U. V. Vazirani. Generating quasi-random sequences from semi-random sources. J. Comput. Syst. Sci., 33(1):75-87, 1986.
-
(1986)
J. Comput. Syst. Sci.
, vol.33
, Issue.1
, pp. 75-87
-
-
Santha, M.1
Vazirani, U.V.2
-
41
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
42
-
-
0026930543
-
IP = PSPACE
-
A. Shamir. IP = PSPACE. J. ACM, 39(4):869-877, 1992.
-
(1992)
J. ACM
, vol.39
, Issue.4
, pp. 869-877
-
-
Shamir, A.1
-
43
-
-
0034505540
-
Extracting randomness from samplable distributions
-
L. Trevisan and S. Vadhan. Extracting randomness from samplable distributions. In Proc. 41st FOCS, pages 32-42, 2000.
-
(2000)
Proc. 41st FOCS
, pp. 32-42
-
-
Trevisan, L.1
Vadhan, S.2
-
44
-
-
0023573599
-
Efficiency considerations in using semi-random sources
-
U. V. Vazirani. Efficiency considerations in using semi-random sources. In Proc. 19th STOC, pages 160-168, 1987.
-
(1987)
Proc. 19th STOC
, pp. 160-168
-
-
Vazirani, U.V.1
-
45
-
-
51249175241
-
Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources
-
U. V. Vazirani. Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources. Combinatorial, 7(4):375-392, 1987.
-
(1987)
Combinatorial
, vol.7
, Issue.4
, pp. 375-392
-
-
Vazirani, U.V.1
-
46
-
-
0022252339
-
Random polynomial time is equal to slightly-random polynomial time
-
U. V. Vazirani and V. V. Vazirani. Random polynomial time is equal to slightly-random polynomial time. In Proc. 26th FOCS, pages 417-428, 1985.
-
(1985)
Proc. 26th FOCS
, pp. 417-428
-
-
Vazirani, U.V.1
Vazirani, V.V.2
-
48
-
-
0001023343
-
Simulating BPP using a general weak random source
-
D. Zuckerman. Simulating BPP using a general weak random source. Algorithmica, 16(4/5): 367-391, 1996.
-
(1996)
Algorithmica
, vol.16
, Issue.4-5
, pp. 367-391
-
-
Zuckerman, D.1
-
49
-
-
0031507665
-
Randomness-optimal oblivious sampling
-
D. Zuckerman. Randomness-optimal oblivious sampling. Random. Struct. Algor, 11(4):345-367, 1997.
-
(1997)
Random. Struct. Algor
, vol.11
, Issue.4
, pp. 345-367
-
-
Zuckerman, D.1
|