-
2
-
-
0025137207
-
The round complexity of secure protocols
-
D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols (extended abstract). In Proc. of 22nd STOC, pages 503-513, 1990.
-
(1990)
Proc. of 22nd STOC
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
3
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. of 20th STOC, pages 1-10, 1988.
-
(1988)
Proc. of 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
17744380057
-
Coin flipping by telephone: A protocol for solving impossible problems
-
M. Blum. Coin flipping by telephone: a protocol for solving impossible problems. SIGACT News, 15(1):23-27, 1983.
-
(1983)
SIGACT News
, vol.15
, Issue.1
, pp. 23-27
-
-
Blum, M.1
-
5
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13:850-864, 1984.
-
(1984)
SIAM J. Comput.
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
6
-
-
27644435077
-
-
Preliminary version
-
Preliminary version in FOCS 82.
-
FOCS 82
-
-
-
7
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. J. Cryptology, 13(1):143-202, 2000.
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
8
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42st FOCS, pages 136-145, 2001.
-
(2001)
Proc. 42st FOCS
, pp. 136-145
-
-
Canetti, R.1
-
9
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crépeau, and I. Damgárd. Multiparty unconditionally secure protocols (extended abstract). In Proc. of 20th STOC, pages 11-19, 1988.
-
(1988)
Proc. of 20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgárd, I.3
-
10
-
-
35248883422
-
Efficient multi-party computation over rings
-
R. Cramer, S. Fehr, Y. Ishai, and E. Kushilevitz. Efficient multi-party computation over rings. In Proc. EUROCRYPT 03, pages 596-613, 2003.
-
(2003)
Proc. EUROCRYPT 03
, pp. 596-613
-
-
Cramer, R.1
Fehr, S.2
Ishai, Y.3
Kushilevitz, E.4
-
14
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
O. Goldreich and L. Levin. A hard-core predicate for all one-way functions. In Proc. 21st STOC, pages 25-32, 1989.
-
(1989)
Proc. 21st STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.2
-
16
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali, Probabilistic encryption. JCSS, 28(2):270-299, 1984.
-
(1984)
JCSS
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
17
-
-
27644435991
-
-
Preliminary version
-
Preliminary version in Proc. STOC 82.
-
Proc. STOC 82
-
-
-
18
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999.
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
19
-
-
0034507841
-
Randomizing polynomials: A new representation with applications to round-efficient secure computation
-
Y. Ishai and E. Kushilevitz. Randomizing polynomials: A new representation with applications to round-efficient secure computation. In Proc. 41st FOCS, pages 294-304, 2000.
-
(2000)
Proc. 41st FOCS
, pp. 294-304
-
-
Ishai, Y.1
Kushilevitz, E.2
-
20
-
-
84869164571
-
Perfect constant-round secure computation via perfect randomizing polynomials
-
Y. Ishai and E. Kushilevitz. Perfect constant-round secure computation via perfect randomizing polynomials. In Proc. 29th ICALP, pages 244-256, 2002.
-
(2002)
Proc. 29th ICALP
, pp. 244-256
-
-
Ishai, Y.1
Kushilevitz, E.2
-
22
-
-
0027627287
-
Constant depth circuits, fourier transform, and leamability
-
N. Linial, Y. Mansour, and N. Nisan. Constant depth circuits, fourier transform, and leamability. J. ACM, 40(3):607-620, 1993.
-
(1993)
J. ACM
, vol.40
, Issue.3
, pp. 607-620
-
-
Linial, N.1
Mansour, Y.2
Nisan, N.3
-
23
-
-
27644593827
-
-
Preliminary version
-
Preliminary version in Proc. 30th FOCS, 1989.
-
(1989)
Proc. 30th FOCS
-
-
-
24
-
-
0001448484
-
Bit commitment using pseudorandomness
-
M. Naor. Bit commitment using pseudorandomness. J. of Cryptolosy, 4:151-158, 1991.
-
(1991)
J. of Cryptolosy
, vol.4
, pp. 151-158
-
-
Naor, M.1
-
26
-
-
0032647187
-
Synthesizers and their application to the parallel construction of pseudo-random functions
-
M. Naor and O. Reingold. Synthesizers and their application to the parallel construction of pseudo-random functions. J. of Computer and Systems Sciences, 58(2):336-375, 1999.
-
(1999)
J. of Computer and Systems Sciences
, vol.582
, pp. 336-375
-
-
Naor, M.1
Reingold, O.2
-
27
-
-
27644559462
-
-
Preliminary version
-
Preliminary version in Proc. 36th FOCS, 1995.
-
(1995)
Proc. 36th FOCS
-
-
-
28
-
-
4243054954
-
Number-theoretic constructions of efficient pseudo-random functions
-
M. Naor and O. Reingold. Number-theoretic constructions of efficient pseudo-random functions. J. ACM. 51(2):231-262, 2004.
-
(2004)
J. ACM.
, vol.51
, Issue.2
, pp. 231-262
-
-
Naor, M.1
Reingold, O.2
-
29
-
-
27644549920
-
-
Preliminary version
-
Preliminary version in Proc. 38th FOCS, 1997.
-
(1997)
Proc. 38th FOCS
-
-
-
30
-
-
35048815001
-
Notions of reducibility between cryptographic primitives
-
TCC '04
-
O. Reingold, L. Trevisan, and S. Vadhan. Notions of reducibility between cryptographic primitives. In TCC '04, volume 2951 of LNCS, pages 1-20, 2004.
-
(2004)
LNCS
, vol.2951
, pp. 1-20
-
-
Reingold, O.1
Trevisan, L.2
Vadhan, S.3
-
32
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28-4:656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
33
-
-
1842599266
-
On garbled circuits and constant round secure function evaluation
-
University of North Texas
-
S. R. Tate and K. Xu. On garbled circuits and constant round secure function evaluation. CoPS Lab Technical Report 2003-02, University of North Texas, 2003.
-
(2003)
CoPS Lab Technical Report
, vol.2003
, Issue.2
-
-
Tate, S.R.1
Xu, K.2
-
37
-
-
0020301290
-
Theory and application of trapdoor functions
-
A. C. Yao. Theory and application of trapdoor functions. In Proc. 23rd FOCS, pages 80-91, 1982.
-
(1982)
Proc. 23rd FOCS
, pp. 80-91
-
-
Yao, A.C.1
-
38
-
-
0022882770
-
How to generate and exchange secrets
-
A. C. Yao. How to generate and exchange secrets. In Proc. 27th FOCS, pages 162-167, 1986.
-
(1986)
Proc. 27th FOCS
, pp. 162-167
-
-
Yao, A.C.1
|