-
1
-
-
0029405656
-
Generalized privacy amplification
-
IEEE
-
Bennett, C. H., Brassard, G., Crépeau, C., and Maurer, U. M.: Generalized privacy amplification. In: IEEE Transactions on Information Theory, Vol. 41, Num. 6. IEEE (1995) 1915-1923.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
2
-
-
0023985539
-
Privacy amplification by public discussion
-
Bennett, C. H., Brassard, G., and Robert, J.-M.: Privacy amplification by public discussion. In: SIAM Journal on Computing, vol. 17 (1988) 210-229.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
3
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
Elsevier
-
Brassard, G., Chaum, D., Crépeau, C.: Minimum disclosure proofs of knowledge. J. of Computer and System Sciences, 37(2). Elsevier (1988) 156-189.
-
(1988)
J. of Computer and System Sciences
, vol.37
, Issue.2
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crépeau, C.3
-
4
-
-
21144437147
-
Oblivious transfers and privacy amplification
-
Brassard, G., Crépeau, C., and Wolf, S.: Oblivious transfers and privacy amplification. In: Journal of Cryptology, vol. 16, no. 4 (2003) 219-237.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.4
, pp. 219-237
-
-
Brassard, G.1
Crépeau, C.2
Wolf, S.3
-
6
-
-
85030121757
-
Equivalence between two flavours of oblivious transfer
-
Advances in Cryptology-CRYPTO '87. Springer-Verlag
-
Crépeau, C.: Equivalence between two flavours of oblivious transfer. In: Advances in Cryptology-CRYPTO '87. Lecture Notes in Computer Science, Vol. 293. Springer-Verlag (1988) 350-354.
-
(1988)
Lecture Notes in Computer Science
, vol.293
, pp. 350-354
-
-
Crépeau, C.1
-
8
-
-
84957356475
-
Efficient cryptographic primitives based on noisy channels
-
Advances in Cryptology-EUROCRYPT '97. Springer-Verlag
-
Crépeau, C.: Efficient cryptographic primitives based on noisy channels. In: Advances in Cryptology-EUROCRYPT '97. Lecture Notes in Computer Science, Vol. 1233. Springer-Verlag (1997) 306-317.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 306-317
-
-
Crépeau, C.1
-
10
-
-
0017973511
-
Broadcast channels with confidential messages
-
Csiszár, I., and Körner, J.: Broadcast channels with confidential messages. In: IEEE Trans. on Information Theory, Vol. 24 (1978) 339-348.
-
(1978)
IEEE Trans. on Information Theory
, vol.24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
11
-
-
84957697395
-
On the (im)possibility of basing bit commitment and oblivious transfer on weakened security assumptions
-
Advances in Cryptology-EUROCRYPT '99. Springer-Verlag
-
Damgård, I., Kilian, J., Salvail, L.: On the (im)possibility of basing bit commitment and oblivious transfer on weakened security assumptions. In: Advances in Cryptology-EUROCRYPT '99. LNCS, vol. 1592. Springer-Verlag (1999) 56-73.
-
(1999)
LNCS
, vol.1592
, pp. 56-73
-
-
Damgård, I.1
Kilian, J.2
Salvail, L.3
-
12
-
-
0036040061
-
Tight security proofs for the bounded-storage model
-
Dziembowski, S. and Maurer, U. M.: Tight security proofs for the bounded-storage model. In: Proceedings of STOC 2002 (2002) 341-350.
-
(2002)
Proceedings of STOC 2002
, pp. 341-350
-
-
Dziembowski, S.1
Maurer, U.M.2
-
13
-
-
0020878801
-
A randomized protocol for signing contracts
-
Plenum Press
-
Even, S., Goldreich, O., and Lempel, A.: A randomized protocol for signing contracts. In: Proceedings of CRYPTO '82. Plenum Press (1983) 205-210.
-
(1983)
Proceedings of CRYPTO '82
, pp. 205-210
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
15
-
-
84955566100
-
Generalized oblivious transfer protocols based on noisy channels
-
Proc. Workshop MMM ACNS 2001. Springer-Verlag
-
Korjik, V., Morozov, K.: Generalized oblivious transfer protocols based on noisy channels. In: Proc. Workshop MMM ACNS 2001. LNCS, vol. 2052. Springer-Verlag (2001) 219-229.
-
(2001)
LNCS
, vol.2052
, pp. 219-229
-
-
Korjik, V.1
Morozov, K.2
-
17
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
Maurer, U. M., Conditionally-perfect secrecy and a provably-secure randomized cipher. In: Journal of Cryptology, Vol. 5, No. 1 (1992) 53-66.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.M.1
-
18
-
-
84957050617
-
Information-theoretic cryptography
-
Advances in Cryptology - CRYPTO '99, Springer-Verlag
-
Maurer, U. M.: Information-theoretic cryptography. In: Advances in Cryptology - CRYPTO '99, LNCS, Vol. 1666. Springer-Verlag. (1999) 47-64.
-
(1999)
LNCS
, vol.1666
, pp. 47-64
-
-
Maurer, U.M.1
-
19
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Aiken Computation Laboratory, Harvard University
-
Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Memo TR-81, Aiken Computation Laboratory, Harvard University (1981).
-
(1981)
Technical Memo
, vol.TR-81
-
-
Rabin, M.O.1
-
20
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C. E.: Communication theory of secrecy systems. In: Bell System Technical Journal, Vol. 28 (1949) 656-715.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
22
-
-
23944463739
-
Commitment capacity of discrete memoryless channels
-
Cryptography and Coding. Springer-Verlag
-
Winter, A., Nascimento, A.C.A., Imai, H.: Commitment capacity of discrete memoryless channels. In: Cryptography and Coding. LNCS, vol. 2898. Springer-Verlag (2003) 35-51.
-
(2003)
LNCS
, vol.2898
, pp. 35-51
-
-
Winter, A.1
Nascimento, A.C.A.2
Imai, H.3
-
24
-
-
0016562514
-
The wire-tap channel
-
Wyner, A. D.: The wire-tap channel. In: Bell System Technical Journal, Vol. 54, No. 8 (1975) 1355-1387.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
|