-
1
-
-
0036949106
-
Constant-round coin-tossing with a man in the middle or realizing the shared random string model
-
B. Barak. Constant-round coin-tossing with a man in the middle or realizing the shared random string model. In 43rd FOCS, pages 345-355, 2002.
-
(2002)
43rd FOCS
, pp. 345-355
-
-
Barak, B.1
-
2
-
-
84941151742
-
-
Bluetooth. http://www.bluetooth.com/bluetooth/.
-
-
-
-
4
-
-
0031642212
-
Non-interactive and non-malleable commitment
-
G. Di Crescenzo, Y. Ishai, and R. Ostrovsky. Non-interactive and non-malleable commitment. In 30th STOC, pages 141-150, 1998.
-
(1998)
30th STOC
, pp. 141-150
-
-
Di Crescenzo, G.1
Ishai, Y.2
Ostrovsky, R.3
-
5
-
-
84945133720
-
Efficient and non-interactive non-malleable commitment
-
G. Di Crescenzo, J. Katz, R. Ostrovsky, and A. Smith. Efficient and non-interactive non-malleable commitment. In EUROCRYPT '01, pages 40-59, 2001.
-
(2001)
EUROCRYPT '01
, pp. 40-59
-
-
Di Crescenzo, G.1
Katz, J.2
Ostrovsky, R.3
Smith, A.4
-
6
-
-
0343337504
-
Non-malleable cryptography
-
D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. SIAM Journal on Computing, 30(2):391-437, 2000.
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
7
-
-
1842755386
-
Cryptanalysis of the Gemmell and Naor multiround authentication protocol
-
C. Gehrmann. Cryptanalysis of the Gemmell and Naor multiround authentication protocol. In CRYPTO '94, pages 121-128, 1994.
-
(1994)
CRYPTO '94
, pp. 121-128
-
-
Gehrmann, C.1
-
9
-
-
85013455236
-
Codes for interactive authentication
-
P. Gemmell and M. Naor. Codes for interactive authentication. In CRYPTO '93, pages 355-367, 1993.
-
(1993)
CRYPTO '93
, pp. 355-367
-
-
Gemmell, P.1
Naor, M.2
-
10
-
-
0016038540
-
Codes which detect deception
-
E. Gilbert, F. MacWilliams, and N. Sloane. Codes which detect deception. Bell System Technical Journal, 53(3):405-424, 1974.
-
(1974)
Bell System Technical Journal
, vol.53
, Issue.3
, pp. 405-424
-
-
Gilbert, E.1
MacWilliams, F.2
Sloane, N.3
-
11
-
-
0024770898
-
One-way functions are essential for complexity based cryptography
-
R. Impagliazzo and M. Luby. One-way functions are essential for complexity based cryptography. In 30th FOCS, pages 230-235, 1989.
-
(1989)
30th FOCS
, pp. 230-235
-
-
Impagliazzo, R.1
Luby, M.2
-
12
-
-
51249099680
-
Efficient mutual data authentication using manually authenticated strings
-
S. Laur, N. Asokan, and K. Nyberg. Efficient mutual data authentication using manually authenticated strings. Cryptology ePrint Archive, Report 2005/424, 2005.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.424
-
-
Laur, S.1
Asokan, N.2
Nyberg, K.3
-
13
-
-
0034228863
-
Authentication theory and hypothesis testing
-
U. M. Maurer. Authentication theory and hypothesis testing. IEEE Transactions on Information Theory, 46(4):1350-1356, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1350-1356
-
-
Maurer, U.M.1
-
14
-
-
33748605569
-
The complexity of online memory checking
-
M. Naor and G. N. Rothblum. The complexity of online memory checking. In 46th FOCS, pages 573-584, 2005.
-
(2005)
46th FOCS
, pp. 573-584
-
-
Naor, M.1
Rothblum, G.N.2
-
15
-
-
84941149826
-
Tight bounds for unconditional authentication protocols in the manual channel and shared key models
-
M. Naor, G. Segev, and A. Smith. Tight bounds for unconditional authentication protocols in the manual channel and shared key models. Cryptology ePrint Archive, Report 2006/175, 2006.
-
(2006)
Cryptology EPrint Archive, Report
, vol.2006
, Issue.175
-
-
Naor, M.1
Segev, G.2
Smith, A.3
-
16
-
-
34848838622
-
New and improved constructions of non-malleable cryptographic protocols
-
R. Pass and A. Rosen. New and improved constructions of non-malleable cryptographic protocols. In 37th STOC, pages 533-542, 2005.
-
(2005)
37th STOC
, pp. 533-542
-
-
Pass, R.1
Rosen, A.2
-
17
-
-
84983269168
-
Authentication theory/coding theory
-
G. J. Simmons. Authentication theory/coding theory. In CRYPTO '84, pages 411-431, 1984.
-
(1984)
CRYPTO '84
, pp. 411-431
-
-
Simmons, G.J.1
-
18
-
-
85034654432
-
The practice of authentication
-
G. J. Simmons. The practice of authentication. In EUROCRYPT '85, pages 261-272, 1985.
-
(1985)
EUROCRYPT '85
, pp. 261-272
-
-
Simmons, G.J.1
-
19
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
S. Vaudenay. Secure communications over insecure channels based on short authenticated strings. In CRYPTO '05, pages 309-326, 2005.
-
(2005)
CRYPTO '05
, pp. 309-326
-
-
Vaudenay, S.1
-
20
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22(3):265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, L.2
|