-
1
-
-
79251578513
-
On the (Im)possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, K. Yang. On the (Im)possibility of Obfuscating Programs. In Advances in Cryptology - CRYPTO 2001, pp. 1-18.
-
Advances in Cryptology - CRYPTO 2001
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
2
-
-
0023985539
-
Privacy amplification by public discussion
-
C. Bennett, G. Brassard, and J. Robert. Privacy Amplification by Public Discussion. SIAM J. on Computing, 17(2), pp. 210-229, 1988.
-
(1988)
SIAM J. on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.1
Brassard, G.2
Robert, J.3
-
5
-
-
0001777508
-
Linking information reconciliation and privacy amplification
-
Christian Cachin, Ueli M. Maurer. Linking Information Reconciliation and Privacy Amplification. In J. Cryptology, 10(2), 97-110, 1997.
-
(1997)
J. Cryptology
, vol.10
, Issue.2
, pp. 97-110
-
-
Cachin, C.1
Maurer, U.M.2
-
6
-
-
0842305659
-
Towards realizing random oracles: Hash functions that hide all partial information
-
R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information, In Advances in Cryptology - CRYPTO 1997.
-
Advances in Cryptology - CRYPTO 1997
-
-
Canetti, R.1
-
9
-
-
0033896024
-
Communication complexity of document exchange
-
Graham Cormode, Mike Paterson, Süleyman Cenk Sahinalp, Uzi Vishkin. Communication complexity of document exchange. Proc. ACM Symp. on Discrete Algorithms, 2000, p. 197-206.
-
Proc. ACM Symp. on Discrete Algorithms
, vol.2000
, pp. 197-206
-
-
Cormode, G.1
Paterson, M.2
Sahinalp, S.C.3
Vishkin, U.4
-
12
-
-
84890422142
-
Entropic security and the encryption of high-entropy messages
-
Y. Dodis and A. Smith. Entropic Security and the Encryption of High-Entropy Messages. In Theory of Cryptography 2005.
-
Theory of Cryptography 2005
-
-
Dodis, Y.1
Smith, A.2
-
13
-
-
0021409284
-
Probabilistic encryption
-
April
-
S. Goldwasser and S. Micali. Probabilistic encryption. JCSS, 28(2), pp. 270-299, April 1984.
-
(1984)
JCSS
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
17
-
-
0041426716
-
Practical protocol for advantage distillation and information reconciliation
-
Shengli Liu and Henk C. A. Van Tilborg and Marten Van Dijk. Practical Protocol for Advantage Distillation and Information Reconciliation. Des. Codes Cryptography, 30(1), 39-62, 2003.
-
(2003)
Des. Codes Cryptography
, vol.30
, Issue.1
, pp. 39-62
-
-
Liu, S.1
Henk, C.A.2
Van Tilborg, H.C.A.3
Van Dijk, M.4
-
18
-
-
4344636292
-
Encryption against storage-bounded adversaries from oil-line strong extractors
-
Chi-Jen Lu. Encryption against Storage-Bounded Adversaries from Oil-Line Strong Extractors. J. Cryptology, 17(1): 27-42 (2004).
-
(2004)
J. Cryptology
, vol.17
, Issue.1
, pp. 27-42
-
-
Lu, C.-J.1
-
20
-
-
0003525990
-
-
North-Holland, Amsterdam, New York, Oxford
-
F. J. MacWilllams and N. J. A. Sloane. The Theory of Error-Correcting Codes, North-Holland, Amsterdam, New York, Oxford, 1978.
-
(1978)
The Theory of Error-correcting Codes
-
-
MacWilllams, F.J.1
Sloane, N.J.A.2
-
21
-
-
0027599802
-
Secret key agreement by public discussion
-
U. Maurer. Secret Key Agreement by Public Discussion. IEEE Trans. on Info. Theory, 39(3):733-742, 1993.
-
(1993)
IEEE Trans. on Info. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
22
-
-
0027641832
-
Small-bias probability spaces: Efficient constructions and applications
-
J. Naor, M. Naor. Small-Bias Probability Spaces: Efficient Constructions and Applications.SIAM J. Comput. 22(4): 838-856 (1993).
-
(1993)
SIAM J. Comput.
, vol.22
, Issue.4
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
23
-
-
0030086632
-
Randomness is linear in space
-
N. Nisan, D. Zuckerman. Randomness is Linear in Space. In JCSS, 52(1), pp. 43-52, 1996.
-
(1996)
JCSS
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
25
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
R. Shaltiel. Recent developments in Explicit Constructions of Extractors. Bulletin of the EATCS, 77, pp. 67-95, 2002.
-
(2002)
Bulletin of the EATCS
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
27
-
-
4344628859
-
Constructing locally computable extractors and cryptosystems in the bounded-storage model
-
Salil P. Vadhan. Constructing Locally Computable Extractors and Cryptosystems In the Bounded-Storage Model. J. Cryptology 17(1): 43-77 (2004).
-
(2004)
J. Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.P.1
|