-
1
-
-
85029542707
-
Foundations of secure interactive computing
-
LNCS, Springer-Verlag
-
D. Beaver, Foundations of Secure Interactive Computing, Advances in Cryptology - Proceedings of CRYPTO '91, LNCS, Vol. 576, pp. 377-391, Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology - Proceedings of CRYPTO '91
, vol.576
, pp. 377-391
-
-
Beaver, D.1
-
2
-
-
84928743703
-
Precomputing oblivious transfer
-
LNCS, Springer-Verlag
-
D. Beaver, Precomputing oblivious transfer, Advances in Cryptology - Proceedings of CRYPTO '95, LNCS, Vol. 963, pp. 97-109, Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology - Proceedings of CRYPTO '95
, vol.963
, pp. 97-109
-
-
Beaver, D.1
-
3
-
-
84969361843
-
Practical quantum oblivious transfer
-
LNCS, Springer-Verlag
-
C. H. Bennett, G. Brassard, C. Crépeau, and H. Skubiszewska, Practical quantum oblivious transfer, Advances in Cryptology - Proceedings of EUROCRYPT '91, LNCS, Vol. 576, pp. 351-366, Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology - Proceedings of EUROCRYPT '91
, vol.576
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, H.4
-
4
-
-
21144437147
-
Oblivious transfers and privacy amplification
-
G. Brassard, C. Crépeau, and S. Wolf, Oblivious transfers and privacy amplification, Journal of Cryptology, Vol. 16, No. 4, pp. 219-237, 2003.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.4
, pp. 219-237
-
-
Brassard, G.1
Crépeau, C.2
Wolf, S.3
-
6
-
-
84957356475
-
Efficient cryptographic protocols based on noisy channels
-
LNCS, Springer-Verlag
-
C. Crépeau, Efficient cryptographic protocols based on noisy channels, Advances in Cryptology - Proceedings of CRYPTO '97, LNCS, Vol. 1233, pp. 306-317, Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology - Proceedings of CRYPTO '97
, vol.1233
, pp. 306-317
-
-
Crépeau, C.1
-
8
-
-
33745173314
-
Efficient unconditional oblivious transfer from almost any noisy channel
-
LNCS, Springer-Verlag
-
C. Crépeau, K. Morozov, and S. Wolf, Efficient unconditional oblivious transfer from almost any noisy channel, Proceedings of Fourth Conference on Security in Communication Networks (SCN) '04, LNCS, Springer-Verlag, 2004.
-
(2004)
Proceedings of Fourth Conference on Security in Communication Networks (SCN) '04
-
-
Crépeau, C.1
Morozov, K.2
Wolf, S.3
-
9
-
-
84969350571
-
On the reversibility of oblivious transfer
-
LNCS, Springer-Verlag
-
C. Crépeau and M. Sántha, On the reversibility of oblivious transfer, Advances in Cryptology - Proceedings of EUROCRYPT '91, LNCS, Vol. 547, pp. 106-113, Springer-Verlag, 1991.
-
(1991)
Advances in Cryptology - Proceedings of EUROCRYPT '91
, vol.547
, pp. 106-113
-
-
Crépeau, C.1
Sántha, M.2
-
10
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel, A randomized protocol for signing contracts, Communications of the ACM, Vol. 28, No. 6, pp. 637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
12
-
-
5044248797
-
Rates for bit commitment and coin tossing from noisy correlation
-
IEEE
-
H. Imai, J. Müller-Quade, A. Nascimetito, and A. Winter, Rates for bit commitment and coin tossing from noisy correlation, Proceedings of the IEEE International Symposium on Information Theory (ISIT) '04, IEEE, 2004.
-
(2004)
Proceedings of the IEEE International Symposium on Information Theory (ISIT) '04
-
-
Imai, H.1
Müller-Quade, J.2
Nascimetito, A.3
Winter, A.4
-
15
-
-
0001336918
-
Unconditionally secure quantum bit commitment is impossible
-
D. Mayers, Unconditionally secure quantum bit commitment is impossible, Phys. Rev. Lett., Vol. 78, pp. 3414-3417, 1997.
-
(1997)
Phys. Rev. Lett.
, vol.78
, pp. 3414-3417
-
-
Mayers, D.1
-
16
-
-
84974655726
-
Secure computation
-
LNCS, Springer-Verlag
-
S. Micali and P. Rogaway, Secure computation. Advances in Cryptology - Proceedings of CRYPTO '91, LNCS, Vol. 576, pp. 392-404, Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology - Proceedings of CRYPTO '91
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
18
-
-
1542660671
-
Fair games against an all-powerful adversary
-
R. Ostrovsky, R. Venkatesan, and M. Yung, Fair games against an all-powerful adversary, AMS DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Vol. 13, pp. 155-169, 1990.
-
(1990)
AMS DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, vol.13
, pp. 155-169
-
-
Ostrovsky, R.1
Venkatesan, R.2
Yung, M.3
-
21
-
-
84856043672
-
A mathematical theory of communication
-
C. E. Shannon, A mathematical theory of communication, Bell System Technical Journal, Vol. 27, pp. 379-423, 623-656, 1948.
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
22
-
-
23944463739
-
Commitment capacity of discrete memoryless channels
-
LNCS, Springer-Verlag
-
A. Winter, A. Nascimento, and H. Imai, Commitment capacity of discrete memoryless channels, Cryptography and Coding, LNCS, Vol. 2898, pp. 35-51, Springer-Verlag, 2003.
-
(2003)
Cryptography and Coding
, vol.2898
, pp. 35-51
-
-
Winter, A.1
Nascimento, A.2
Imai, H.3
-
24
-
-
33745181204
-
New monotones and lower bounds in unconditional two-party computation
-
LNCS, Springer-Verlag
-
S. Wolf and J. Wullschleger. New monotones and lower bounds in unconditional two-party computation. In Advances in Cryptology - Proceedings of CRYPTO '05, LNCS, Vol. 3621, pp. 467-477, Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology - Proceedings of CRYPTO '05
, vol.3621
, pp. 467-477
-
-
Wolf, S.1
Wullschleger, J.2
-
25
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, The wire-tap channel, Bell System Technical Journal, Vol. 54, No. 8, pp. 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
26
-
-
0026155039
-
A new outlook on Shannon's information measures
-
R. W. Yeung, A new outlook on Shannon's information measures, IEEE Transactions on Information Theory, Vol. 37, No. 3, pp. 466-474, 1991.
-
(1991)
IEEE Transactions on Information Theory
, vol.37
, Issue.3
, pp. 466-474
-
-
Yeung, R.W.1
|