-
1
-
-
0025535378
-
Simple constructions of almost k-wise independent random variables
-
Noga Alon, Oded Goldreich, Johan Håstad, René Peralta: Simple Constructions of Almost k-Wise Independent Random Variables. FOCS 1990: 544-553
-
(1990)
FOCS
, pp. 544-553
-
-
Alon, N.1
Goldreich, O.2
Håstad, J.3
Peralta, R.4
-
3
-
-
0023985539
-
Privacy amplification by public discussion
-
C. Bennett, G. Brassard, and J. Robert. Privacy Amplification by Public Discussion. SIAM J. on Computing, 17(2), pp. 210-229, 1988.
-
(1988)
SIAM J. on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.1
Brassard, G.2
Robert, J.3
-
4
-
-
0029405656
-
Generalized privacy amplification
-
C. Bennett, G. Brassard, G. Crépeau, and U. Maurer. Generalized Privacy Amplification. IEEE Transactions on Information Theory, 41(6), pp. 1915-1923, 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.1
Brassard, G.2
Crépeau, G.3
Maurer, U.4
-
5
-
-
0842305659
-
Towards realizing random oracles: Hash functions that hide all partial information
-
R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information. In Crypto 1997.
-
Crypto 1997
-
-
Canetti, R.1
-
7
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Ran Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. Proc. IEEE Symp. on Foundations of Computer Science, 2001, pp. 136-145.
-
(2001)
Proc. IEEE Symp. on Foundations of Computer Science
, pp. 136-145
-
-
Canetti, R.1
-
9
-
-
84860984597
-
Entropic security and the encryption of high entropy messages
-
Full version of this paper
-
Y. Dodis, and A. Smith. Entropic Security and the Encryption of High Entropy Messages. Full version of this paper. Available at IACR Cryptology ePrint Archive, report 2004/219, at http://eprint.iacr.org/2004/219/.
-
IACR Cryptology EPrint Archive, Report
, vol.2004
, Issue.219
-
-
Dodis, Y.1
Smith, A.2
-
10
-
-
0021409284
-
Probabilistic encryption
-
April
-
S. Goldwasser and S. Micali. Probabilistic encryption. JCSS, 28(2), pp. 270-299, April 1984.
-
(1984)
JCSS
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
12
-
-
0031504510
-
Tiny families of functions with random properties: A quality-size trade-off for hashing
-
Oded Goldreich, Avi Wigderson: Tiny families of functions with random properties: A quality-size trade-off for hashing. Random Structures and Algorithms 11(4): 315-343 (1997)
-
(1997)
Random Structures and Algorithms
, vol.11
, Issue.4
, pp. 315-343
-
-
Goldreich, O.1
Wigderson, A.2
-
16
-
-
84991939136
-
LFSR-based hashing and authentication
-
H. Krawczyk. LFSR-Based Hashing and Authentication. In Proc. CRYPTO'94, p. 129-139, 1994.
-
(1994)
Proc. CRYPTO'94
, pp. 129-139
-
-
Krawczyk, H.1
-
18
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
U. Maurer. Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher. J. Cryptology, 5(1), pp. 53-66, 1992.
-
(1992)
J. Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.1
-
19
-
-
0027599802
-
Secret key agreement by public discussion
-
U. Maurer. Secret Key Agreement by Public Discussion. IEEE Trans. on Info. Theory, 39(3):733-742, 1993.
-
(1993)
IEEE Trans. on Info. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
20
-
-
0027641832
-
Small-bias probability spaces: Efficient constructions and applications
-
J. Naor, M. Naor. Small-Bias Probability Spaces: Efficient Constructions and Applications. In SIAM J. Comput. 22(4): 838-856 (1993).
-
(1993)
SIAM J. Comput.
, vol.22
, Issue.4
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
21
-
-
0030086632
-
Randomness is linear in space
-
N. Nisan, D. Zuckerman. Randomness is Linear in Space. In JCSS, 52(1), pp. 43-52, 1996.
-
(1996)
JCSS
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
22
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
B. Pfitzmann, M. Waidner. A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In Proc. IEEE Symp. on Security and Privacy, 2001, 184-200.
-
(2001)
Proc. IEEE Symp. on Security and Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
25
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon. Communication Theory of Secrecy systems. In Bell Systems Technical J., 28:656-715, 1949. Note: The material in this paper appeared originally in a confidential report 'A Mathematical Theory of Cryptography', dated Sept. 1, 1945, which has now been declassified.
-
(1949)
Bell Systems Technical J.
, vol.28
, pp. 656-715
-
-
Shannon, C.1
|