-
1
-
-
0036039958
-
The invasiveness of off-line memory checking
-
M. Ajtai. The Invasiveness of Off-line Memory Checking. STOC 2002: 504-513
-
STOC 2002
, pp. 504-513
-
-
Ajtai, M.1
-
2
-
-
84983741260
-
Randomized simultaneous messages: Solution of a problem of yao in communication complexity
-
L. Babai and P. G. Kimmel. Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity. IEEE Conference on Computational Complexity 1997: 239-246
-
IEEE Conference on Computational Complexity 1997
, pp. 239-246
-
-
Babai, L.1
Kimmel, P.G.2
-
3
-
-
0032687055
-
One-way functions are essential for single-server private information retrieval
-
A. Beimel, Y. Ishai, E. Kushilevitz and T. Malkin. One-Way Functions Are Essential for Single-Server Private Information Retrieval. STOC 1999: 89-98
-
STOC 1999
, pp. 89-98
-
-
Beimel, A.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
4
-
-
85024585723
-
Incremental cryptography: The case of hashing and signing
-
M. Bellare, O. Goldreich and S. Goldwasser. Incremental Cryptography: The Case of Hashing and Signing. CRYPTO 1994: 216-233
-
CRYPTO 1994
, pp. 216-233
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
5
-
-
0345350047
-
Incremental cryptography and application to virus protection
-
M. Bellare, O. Goldreich and S. Goldwasser. Incremental Cryptography and Application to Virus Protection. STOC 1995: 45-56
-
STOC 1995
, pp. 45-56
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
6
-
-
0031334110
-
Does parallel repetition lower the error in computationally sound protocols?
-
M. Bellare, R. Impagliazzo and M. Naor. Does Parallel Repetition Lower the Error in Computationally Sound Protocols? FOCS 1997: 374-383
-
FOCS 1997
, pp. 374-383
-
-
Bellare, M.1
Impagliazzo, R.2
Naor, M.3
-
7
-
-
4544310411
-
Robust PCPs of proximity, shorter PCPs and applications to coding
-
E. Ben-Sasson, O. Goldreich, P. Harsha, M. Sudan and S. P. Vadhan. Robust PCPs of Proximity, Shorter PCPs and Applications to Coding. STOC 2004: 1-10
-
STOC 2004
, pp. 1-10
-
-
Ben-Sasson, E.1
Goldreich, O.2
Harsha, P.3
Sudan, M.4
Vadhan, S.P.5
-
8
-
-
34848899251
-
Simple PCPs with poly-log rate and query complexity
-
E. Ben-Sasson and M. Sudan. Simple PCPs with Poly-log Rate and Query Complexity STOC 2005: 266-275
-
STOC 2005
, pp. 266-275
-
-
Ben-Sasson, E.1
Sudan, M.2
-
9
-
-
0028482823
-
Checking the correctness of memories
-
M. Blum, W. S. Evans, P. Gemmell, S. Kannan and M. Naor. Checking the Correctness of Memories. Algorithmica 12(2/3): 225-244 (1994)
-
(1994)
Algorithmica
, vol.12
, Issue.2-3
, pp. 225-244
-
-
Blum, M.1
Evans, W.S.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
10
-
-
0029214558
-
Designing programs that check their work
-
M. Blum and S. Kannan. Designing Programs that Check Their Work. Journal of the ACM 42(1): 269-291 (1995)
-
(1995)
Journal of the ACM
, vol.42
, Issue.1
, pp. 269-291
-
-
Blum, M.1
Kannan, S.2
-
11
-
-
80051636706
-
Single database private information retrieval implies oblivious transfer
-
G. Di-Crescenzo, T. Malkin and R. Ostrovsky. Single Database Private Information Retrieval Implies Oblivious Transfer. EUROCRYPT 2000: 122-138
-
EUROCRYPT 2000
, pp. 122-138
-
-
Di-Crescenzo, G.1
Malkin, T.2
Ostrovsky, R.3
-
12
-
-
33748103563
-
Some improvements to total degree tests
-
K. Friedl and M. Sudan. Some Improvements to Total Degree Tests. ISTCS 1995: 190-198
-
ISTCS 1995
, pp. 190-198
-
-
Friedl, K.1
Sudan, M.2
-
13
-
-
85013455236
-
Codes for interactive authentication
-
P. Gemmell and M. Naor. Codes for Interactive Authentication. CRYPTO 1993: 355-367
-
CRYPTO 1993
, pp. 355-367
-
-
Gemmell, P.1
Naor, M.2
-
15
-
-
0023547498
-
Towards a theory of software protection and simulation by oblivious RAMs
-
O. Goldreich. Towards a Theory of Software Protection and Simulation by Oblivious RAMs. STOC 1987: 182-194
-
STOC 1987
, pp. 182-194
-
-
Goldreich, O.1
-
16
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky. Software Protection and Simulation on Oblivious RAMs. Journal of the ACM 43(3): 431-473 (1996)
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
17
-
-
0036949141
-
Locally testable codes and PCPs of almost-linear length
-
O. Goldreich and M. Sudan. Locally Testable Codes and PCPs of Almost-Linear Length. FOCS 2002: 13-22
-
FOCS 2002
, pp. 13-22
-
-
Goldreich, O.1
Sudan, M.2
-
19
-
-
0024770898
-
One-way functions are essential for complexity based cryptography
-
R. Impagliazzo and M. Luby. One-way Functions are Essential for Complexity Based Cryptography. FOCS 1989: 230-235
-
FOCS 1989
, pp. 230-235
-
-
Impagliazzo, R.1
Luby, M.2
-
20
-
-
0033720713
-
On the efficiency of local decoding procedures for error-correcting codes
-
J. Katz and L. Trevisan. On the Efficiency of Local Decoding Procedures for Error-Correcting Codes. STOC 2000: 80-86
-
STOC 2000
, pp. 80-86
-
-
Katz, J.1
Trevisan, L.2
-
21
-
-
0033434847
-
On randomized one-round communication complexity
-
I. Kremer, N. Nisan and D. Ron. On Randomized One-Round Communication Complexity. Computational Complexity 8(1): 21-49 (1999)
-
(1999)
Computational Complexity
, vol.8
, Issue.1
, pp. 21-49
-
-
Kremer, I.1
Nisan, N.2
Ron, D.3
-
23
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
M. Naor and M. Yung. Universal One-Way Hash Functions and their Cryptographic Applications. STOC 1989: 33-43
-
STOC 1989
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
24
-
-
0029706950
-
Public vs. private coin flips in one round communication games
-
I. Newman and M. Szegedy. Public vs. Private Coin Flips in One Round Communication Games. STOC 1996: 561-570
-
STOC 1996
, pp. 561-570
-
-
Newman, I.1
Szegedy, M.2
-
25
-
-
0025154732
-
Efficient computation on oblivious RAMs
-
R. Ostrovsky. Efficient Computation on Oblivious RAMs. STOC 1990: 514-523
-
STOC 1990
, pp. 514-523
-
-
Ostrovsky, R.1
-
26
-
-
0008519096
-
One-way functions are essential for non-trivial zero-knowledge
-
R. Ostrovsky and A. Wigderson. One-Way Functions are Essential for Non-Trivial Zero-Knowledge. ISTCS 1993: 3-17
-
ISTCS 1993
, pp. 3-17
-
-
Ostrovsky, R.1
Wigderson, A.2
-
27
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and L. Carter. New Hash Functions and Their Use in Authentication and Set Equality. JCSS 22(3): 265-279 (1981)
-
(1981)
JCSS
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, L.2
-
28
-
-
85039623622
-
Some complexity questions related to distributive computing
-
A. Chi-Chih Yao. Some Complexity Questions Related to Distributive Computing. STOC 1979: 209-213
-
STOC 1979
, pp. 209-213
-
-
Yao, A.C.-C.1
|