-
1
-
-
4944255012
-
Multiparty quantum coin flipping
-
IEEE Computer Society
-
Andris Ambanis, Harry Buhrman, Yevgeniy Dodis, and Heinz Röhrig. Multiparty quantum coin flipping. In 19th Annual IEEE Conference on Computational Complexity, Proceedings of CoCo 2002, pages 250-259. IEEE Computer Society, 2004.
-
(2004)
19th Annual IEEE Conference on Computational Complexity, Proceedings of CoCo 2002
, pp. 250-259
-
-
Ambanis, A.1
Buhrman, H.2
Dodis, Y.3
Röhrig, H.4
-
2
-
-
31844445449
-
On fairness in simulatability-based cryptographic systems
-
ACM Press
-
Michael Backes, Dennis Hofheinz, Jörn Müller-Quade, and Dominique Unruh. On fairness in simulatability-based cryptographic systems. In 3rd ACM Workshop on Formal Methods in Security Engineering, Proceedings of FMSE 2005, pages 13-22. ACM Press, 2005.
-
(2005)
3rd ACM Workshop on Formal Methods in Security Engineering, Proceedings of FMSE 2005
, pp. 13-22
-
-
Backes, M.1
Hofheinz, D.2
Müller-Quade, J.3
Unruh, D.4
-
4
-
-
0029719668
-
Distributed pseudo-random bit generators - A new way to speed-up shared coin tossing
-
ACM Press
-
Mihir Bellare, Juan A. Garay, and Tal Rabin. Distributed pseudo-random bit generators - a new way to speed-up shared coin tossing. In Fifteenth Annual ACM Symposium on Principles of Distributed Computing, Proceedings of PODC 1996, pages 191-200. ACM Press, 1996.
-
(1996)
Fifteenth Annual ACM Symposium on Principles of Distributed Computing, Proceedings of PODC 1996
, pp. 191-200
-
-
Bellare, M.1
Garay, J.A.2
Rabin, T.3
-
5
-
-
0003651338
-
Coin flipping by telephone
-
Allen Gersho, editor, number 82-04 in ECE Report, University of California, Electrical and Computer Engineering
-
Manuel Blum. Coin flipping by telephone. In Allen Gersho, editor, Advances in Cryptology, A report on CRYPTO 81, number 82-04 in ECE Report, pages 11-15. University of California, Electrical and Computer Engineering, 1982.
-
(1982)
Advances in Cryptology, A Report on CRYPTO 81
, pp. 11-15
-
-
Blum, M.1
-
9
-
-
84880897758
-
Universally composable commitments
-
Joe Kilian, editor, number 2139 in Lecture Notes in Computer Science, Springer-Verlag
-
Ran Canetti and Marc Fischlin. Universally composable commitments. In Joe Kilian, editor, Advances in Cryptology, Proceedings of CRYPTO 2001, number 2139 in Lecture Notes in Computer Science, pages 19-40. Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology, Proceedings of CRYPTO 2001
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
10
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
ACM Press, Extended abstract
-
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, and Amit Sahai. Universally composable two-party and multi-party secure computation. In 34th Annual ACM Symposium on Theory of Computing, Proceedings of STOC 2002, pages 494-503. ACM Press, 2002. Extended abstract.
-
(2002)
34th Annual ACM Symposium on Theory of Computing, Proceedings of STOC 2002
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
15
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
ACM Press, Extended abstract
-
Russell Impagliazzo, Leonid A. Levin, and Michael Luby. Pseudo-random generation from one-way functions. In Twenty-First Annual ACM Symposium on Theory of Computing, Proceedings of STOC 1989, pages 12-24. ACM Press, 1989. Extended abstract.
-
(1989)
Twenty-first Annual ACM Symposium on Theory of Computing, Proceedings of STOC 1989
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
16
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
IEEE Computer Society
-
Birgit Pfitzmann and Michael Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In IEEE Symposium on Security and Privacy, Proceedings of SSP 2001, pages 184-200. IEEE Computer Society, 2001.
-
(2001)
IEEE Symposium on Security and Privacy, Proceedings of SSP 2001
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
17
-
-
24144493986
-
Universal hash families and the leftover hash lemma, and applications to cryptography and computing
-
Douglas R. Stinson. Universal hash families and the leftover hash lemma, and applications to cryptography and computing. Journal of Combinatorial Mathematics and Combinatorial Computing, 42:3-31, 2002.
-
(2002)
Journal of Combinatorial Mathematics and Combinatorial Computing
, vol.42
, pp. 3-31
-
-
Stinson, D.R.1
|