-
1
-
-
0029405656
-
Generalized privacy amplifi cation
-
Charles Bennett, Gilles Brassard, Claude Crepeau, and Ueli Maurer. Generalized privacy amplifi cation. IEEE Transactions on Information Theory, Vol. 41, 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
-
-
Bennett, C.1
Brassard, G.2
Crepeau, C.3
Maurer, U.4
-
2
-
-
0003030602
-
Coin flpping by telephone: A protocol for solving impossible problems
-
Manuel Blum. Coin flpping by telephone: A protocol for solving impossible problems. In Proceedings of the 24th IEEE Computer Conference, pages 133-137, 1982.
-
(1982)
Proceedings of the 24th IEEE Computer Conference
, pp. 133-137
-
-
Blum, M.1
-
4
-
-
33745173314
-
Oblivious transfer from any noisy channel
-
To appear, Springer-Verlag
-
Claude Crepeau, Kirill Morozov, and Stefan Wolf. Oblivious transfer from any noisy channel. To appear in Proceedings of SCN'04, Springer-Verlag, 2004.
-
(2004)
Proceedings of SCN'04
-
-
Crepeau, C.1
Morozov, K.2
Wolf, S.3
-
5
-
-
84957697395
-
On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
-
Advances in Cryptology: CRYPTO'99. Springer-Verlag
-
Ivan Damgård, Joe Kilian, and Louis Salvail. On the (im) possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In Advances in Cryptology: CRYPTO'99, volume 1592 of Lecture Notes in Computer Science, pages 56-73. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 56-73
-
-
Damgård, I.1
Kilian, J.2
Salvail, L.3
-
6
-
-
35048830930
-
Pseudo-signatures, broadcast, and multi-party computation from correlated randomness
-
Lecture Notes in Computer Science. Springer-Verlag
-
Matthias Fitzi, Stefan Wolf, and Jürg Wullschleger. Pseudo-signatures, broadcast, and multi-party computation from correlated randomness. In Advances in Cryptology: CRYPTO'04, Lecture Notes in Computer Science. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology: CRYPTO'04
-
-
Fitzi, M.1
Wolf, S.2
Wullschleger, J.3
-
9
-
-
0034188149
-
How to turn loaded dice into fair coins
-
Ari Juels, Markus Jakobsson, Elizabeth Shriver, and Bruce K. Hillyer. How to turn loaded dice into fair coins. IEEE Transactions on Information Theory, Vol. 46, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
-
-
Juels, A.1
Jakobsson, M.2
Shriver, E.3
Hillyer, B.K.4
-
12
-
-
84976699318
-
The Byzantine generals problem
-
Leslie Lamport, Robert Shostak, and Marshall Pease. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401, 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
13
-
-
0027599802
-
Secret key agreement by public discussion
-
Ueli Maurer. Secret key agreement by public discussion. IEEE Transaction on Information Theory, 39(3):733-742, 1993.
-
(1993)
IEEE Transaction on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
14
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Harvard Aiken Computation Laboratory
-
Michael O. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory, 1981.
-
(1981)
Technical Report
, vol.TR-81
-
-
Rabin, M.O.1
-
16
-
-
84856043672
-
A mathematical theory of communication
-
Claude E. Shannon. A mathematical theory of communication. Bell System Tech. Journal, 27:379-423, 623-656, 1948.
-
(1948)
Bell System Tech. Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
17
-
-
84890522850
-
Communication theory of secrecy systems
-
Claude E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28(4), 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
-
-
Shannon, C.E.1
-
19
-
-
0016562514
-
The wire-tap channel
-
Aaron D. Wyner. The wire-tap channel. Bell System Tech. Journal, 54:1355-1387, 1975.
-
(1975)
Bell System Tech. Journal
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
|