-
1
-
-
84976804419
-
How to exchange (secret) keys
-
Manuel Blum, How to exchange (secret) keys, ACM Transactions on Computer Systems 1 (1983), no. 2, 175-193.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.2
, pp. 175-193
-
-
Blum, M.1
-
2
-
-
0022864717
-
Information theoretic reductions among disclosure problems
-
(Los Angeles, Ca., USA), IEEE, October
-
G. Brassard, C. Crepeau, and J.-M. Robert, Information theoretic reductions among disclosure problems, 27th Annual Symp. on Foundations of Computer Science (FOGS '86) (Los Angeles, Ca., USA), IEEE, October 1986, pp. 168-173.
-
(1986)
27th Annual Symp. on Foundations of Computer Science (FOGS '86)
, pp. 168-173
-
-
Brassard, G.1
Crepeau, C.2
Robert, J.-M.3
-
3
-
-
85012928152
-
Weakening security assumptions and oblivious transfer
-
(Berlin - Heidelberg - New York), Springer, August
-
C. Crépeau and J. Kilian, Weakening security assumptions and oblivious transfer, Advances in Cryptology (CRYPTO '88) (Berlin - Heidelberg - New York), Springer, August 1990, pp. 2-7.
-
(1990)
Advances in Cryptology (CRYPTO '88)
, pp. 2-7
-
-
Crépeau, C.1
Kilian, J.2
-
4
-
-
84969350571
-
On the reversibility of oblivious transfer
-
Proceedings of Advances in Cryptology (EUROCRYPT '91) (Berlin, Germany) (Donald W. Davies, ed.), Springer, April
-
C. Crépeau and M. Sántha, On the reversibility of oblivious transfer, Proceedings of Advances in Cryptology (EUROCRYPT '91) (Berlin, Germany) (Donald W. Davies, ed.), LNCS, vol. 547, Springer, April 1991, pp. 106-113.
-
(1991)
LNCS
, vol.547
, pp. 106-113
-
-
Crépeau, C.1
Sántha, M.2
-
5
-
-
85030121757
-
Equivalence between two flavours of oblivious transfers
-
Advances in Cryptology - CRYPTO '87 (Carl Pomerance, ed.), Springer-Verlag, 16-20 August 1987
-
Claude Crépeau, Equivalence between two flavours of oblivious transfers, Advances in Cryptology - CRYPTO '87 (Carl Pomerance, ed.), Lecture Notes in Computer Science, vol. 293, Springer-Verlag, 1988, 16-20 August 1987, pp. 350-354.
-
(1988)
Lecture Notes in Computer Science
, vol.293
, pp. 350-354
-
-
Crépeau, C.1
-
6
-
-
84957697395
-
On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
-
Ivan Damgård, Joe Kilian, and Louis Salvail, On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions, Lecture Notes in Computer Science 1592 (1999), 56-??
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 56
-
-
Damgård, I.1
Kilian, J.2
Salvail, L.3
-
7
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel, A randomized protocol for signing contracts, Communications of the ACM 28 (1985), no. 6, 637-647.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
8
-
-
0034497243
-
The relationship between public key encryption and oblivious transfer
-
2000, Redondo Beach, California (IEEE, ed.), IEEE
-
Y. Gertner, S. Kannan, T. Malkin, O. Reingold, and M. Viswanathan, The relationship between public key encryption and oblivious transfer, 41st Annual Symp. on Foundations of Computer Science: proceedings: 12-14 November, 2000, Redondo Beach, California (IEEE, ed.), IEEE, 2000, pp. 325-335.
-
(2000)
41st Annual Symp. on Foundations of Computer Science: Proceedings: 12-14 November
, pp. 325-335
-
-
Gertner, Y.1
Kannan, S.2
Malkin, T.3
Reingold, O.4
Viswanathan, M.5
-
9
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
May 15-17, 1989 (New York, NY, USA) (ACM, ed.), ACM Press
-
O. Goldreich and L. A. Levin, A hard-core predicate for all one-way functions, Proceedings of the twenty-first annual ACM Symp. on Theory of Computing, Seattle, Washington, May 15-17, 1989 (New York, NY, USA) (ACM, ed.), ACM Press, 1989, pp. 25-32.
-
(1989)
Proceedings of the Twenty-first Annual ACM Symp. on Theory of Computing, Seattle, Washington
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
10
-
-
0023545076
-
How to play any mental game or A completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson, How to play any mental game or A completeness theorem for protocols with honest majority, Proc. 19th Ann. ACM Symp. on Theory of Computing, 1987, pp. 218-229.
-
(1987)
Proc. 19th Ann. ACM Symp. on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
12
-
-
35048859169
-
-
Working Draft, available at
-
_, Foundations of cryptography - volume 2, Working Draft, available at www.wisdom.weizmann.ac.il/oded/foc-vol2.html, 2002.
-
(2002)
Foundations of Cryptography
, vol.2
-
-
-
14
-
-
84898989941
-
Founding crytpography on oblivious transfer
-
(Richard Cole, ed.), ACM Press, May
-
Joe Kilian, Founding crytpography on oblivious transfer, Proceedings of the 20th Annual ACM Symp. on the Theory of Computing (Chicago, IL) (Richard Cole, ed.), ACM Press, May 1988, pp. 20-31.
-
(1988)
Proceedings of the 20th Annual ACM Symp. on the Theory of Computing (Chicago, IL)
, pp. 20-31
-
-
Kilian, J.1
-
16
-
-
85028462775
-
Zero-knowledge proofs of knowledge without interaction
-
1992, Pittsburgh, Pennsylvania: proceedings [papers] (Silver Spring, MD 20910, USA) (IEEE, ed.), IEEE
-
A. De Santis and G. Persiano, Zero-knowledge proofs of knowledge without interaction, 33rd Annual Symp. on Foundations of Computer Science: October 24-27, 1992, Pittsburgh, Pennsylvania: proceedings [papers] (Silver Spring, MD 20910, USA) (IEEE, ed.), IEEE, 1992, pp. 427-436.
-
(1992)
33rd Annual Symp. on Foundations of Computer Science: October 24-27
, pp. 427-436
-
-
De Santis, A.1
Persiano, G.2
|