-
1
-
-
0035166072
-
How to go beyond the black-box simulation barrier
-
B. Barak. How to Go Beyond the Black-box Simulation Barrier. In 42nd FOCS, pages 106-115, 2001.
-
(2001)
42nd FOCS
, pp. 106-115
-
-
Barak, B.1
-
2
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computations
-
M. Ben-Or, S. Goldwasser and A. Wigderson. Completeness Theorems for Non-cryptographic Fault-Tolerant Distributed Computations. In 20th STOC, pages 1-10, 1988.
-
(1988)
20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology, 13(1):143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
4
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Full version
-
R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd FOCS, pages 136-145, 2001. Full version available at http://eprint.iacr.org/2000/067.
-
(2001)
42nd FOCS
, pp. 136-145
-
-
Canetti, R.1
-
5
-
-
84880897758
-
Universally composable commitments
-
Springer-Verlag (LNCS 2139)
-
R. Canetti and M. Fischlin. Universally Composable Commitments. In CRYPTO 2001, Springer-Verlag (LNCS 2139), pages 19-40, 2001.
-
(2001)
CRYPTO 2001
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
6
-
-
24944566824
-
Universally composable password-based key exchange
-
Springer-Verlag (LNCS 3494)
-
R. Canetti, S. Halevi, J. Katz, Y. Lindell and P. MacKenzie. Universally Composable Password-Based Key Exchange. In EUROCRYPT 2005, Springer-Verlag (LNCS 3494), pages 404-421, 2005.
-
(2005)
EUROCRYPT 2005
, pp. 404-421
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
Lindell, Y.4
MacKenzie, P.5
-
7
-
-
35248854495
-
On the limitations of universally composable two-party computation without set-up assumptions
-
Springer-Verlag (LNCS 2656)
-
R. Canetti, E. Kushilevitz and Y. Lindell. On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions. In EUROCRYPT '03, Springer-Verlag (LNCS 2656), pages 68-86, 2003.
-
(2003)
EUROCRYPT '03
, pp. 68-86
-
-
Canetti, R.1
Kushilevitz, E.2
Lindell, Y.3
-
8
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
R. Canetti, Y. Lindell, R. Ostrovsky and A. Sahai. Universally Composable Two-Party and Multi-Party Secure Computation. In 34th STOC, pp. 494-503, 2002.
-
(2002)
34th STOC
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
9
-
-
35248819315
-
Universal composition with joint state
-
Springer-Verlag (LNCS 2729)
-
R. Canetti and T. Rabin. Universal Composition with Joint State. In CRYPTO 2003, Springer-Verlag (LNCS 2729), pages 265-281, 2003.
-
(2003)
CRYPTO 2003
, pp. 265-281
-
-
Canetti, R.1
Rabin, T.2
-
10
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crepeau and I. Damgard. Multiparty Unconditionally Secure Protocols. In 20th STOC, pages 11-19, 1988.
-
(1988)
20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
12
-
-
0001126172
-
Pricing via processing or combating junk mail
-
Springer-Verlag (LNCS 740)
-
C. Dwork and M. Naor. Pricing via Processing or Combating Junk Mail. In CRYPTO'92, Springer-Verlag (LNCS 740), pages 139-147, 1992.
-
(1992)
CRYPTO'92
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
13
-
-
0036954542
-
Detectable byzantine agreement secure against faulty majorities
-
M. Fitzi, D. Gottesman, M. Hirt, T. Holenstein and A. Smith. Detectable Byzantine Agreement Secure Against Faulty Majorities. 21st PODC, pp. 118-126, 2002.
-
(2002)
21st PODC
, pp. 118-126
-
-
Fitzi, M.1
Gottesman, D.2
Hirt, M.3
Holenstein, T.4
Smith, A.5
-
14
-
-
84880888233
-
Session-key generation using human passwords only
-
Springer-Verlag (LNCS 2139)
-
O. Goldreich and Y. Lindell. Session-Key Generation Using Human Passwords Only. In CRYPTO 2001, Springer-Verlag (LNCS 2139), pages 408-432, 2001.
-
(2001)
CRYPTO 2001
, pp. 408-432
-
-
Goldreich, O.1
Lindell, Y.2
-
15
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali and R. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. on Computing, 17(2):281-308, 1988.
-
(1988)
SIAM J. on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
16
-
-
0024611659
-
The knowledge complexity of interactive proof-systems
-
S. Goldwasser, S. Micali and C. Rackoff. The Knowledge Complexity of Interactive Proof-Systems. SIAM Journal on Computing, 18(1):186-208, 1989.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
20
-
-
0038446804
-
Bounded-concurrent secure two-party computation without setup assumptions
-
Y. Lindell. Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions. In 35th STOC, pages 683-692, 2003.
-
(2003)
35th STOC
, pp. 683-692
-
-
Lindell, Y.1
-
21
-
-
35048903637
-
Lower bounds for concurrent self composition
-
Springer-Verlag (LNCS 2951)
-
Y. Lindell. Lower Bounds for Concurrent Self Composition. In 1st TCC, Springer-Verlag (LNCS 2951), pages 203-222, 2004.
-
(2004)
1st TCC
, pp. 203-222
-
-
Lindell, Y.1
-
22
-
-
35048854655
-
Simpler session-key generation from short random passwords
-
Springer-Verlag (LNCS 2951)
-
M. Nguyen and S. Vadhan. Simpler Session-Key Generation from Short Random Passwords. In 1st TCC, Springer-Verlag (LNCS 2951), pages 428-445, 2004.
-
(2004)
1st TCC
, pp. 428-445
-
-
Nguyen, M.1
Vadhan, S.2
-
23
-
-
4544250511
-
Bounded-concurrent secure multi-party computation with a dishonest majority
-
R. Pass. Bounded-Concurrent Secure Multi-Party Computation with a Dishonest Majority. In 36th STOC, pages 232-241, 2004.
-
(2004)
36th STOC
, pp. 232-241
-
-
Pass, R.1
-
24
-
-
0344118869
-
Bounded-concurrent secure two-party computation in a constant number of rounds
-
R. Pass and A. Rosen Bounded-Concurrent Secure Two-Party Computation in a Constant Number of Rounds. In 44th FOCS, pages 404-413, 2003.
-
(2003)
44th FOCS
, pp. 404-413
-
-
Pass, R.1
Rosen, A.2
-
25
-
-
0022882770
-
How to generate and exchange secrets
-
A.C. Yao. How to Generate and Exchange Secrets. 27th FOCS, pp. 162-167, 1986.
-
(1986)
27th FOCS
, pp. 162-167
-
-
Yao, A.C.1
|