-
1
-
-
0027629488
-
Common randomness in information theory and cryptography - Part, I: Secret sharing
-
R. Ahlswede and I. Csiszár. Common randomness in information theory and cryptography - Part, I: secret sharing, IEEE Trans.on Inf. Th.,39(4):1121-1132.1993.
-
(1993)
IEEE Trans.on Inf. Th.
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
4
-
-
35048881610
-
Immunizing encryption schemes from decryption errors
-
C. Cachin and J. Camenisch, ed., EUROCRYPT 2004
-
C. Dwork, M. Naor, and O. Reingold. Immunizing encryption schemes from decryption errors. In C. Cachin and J. Camenisch, ed., EUROCRYPT 2004, volume 3027 of LNCS, pages 342-360, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 342-360
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
-
5
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. JACM, 33(4):792-807, 1986.
-
(1986)
JACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
7
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Håstad, R. Impagliazzo, L. A. Levin, arid M. Luby. A pseudorandom generator from any one-way function. Siam J. on Comp., 28(4):1364-1396, 1999.
-
(1999)
Siam J. on Comp.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, A.M.4
-
8
-
-
0029516814
-
Hard-core distributions for somewhat hard problems
-
R. Impagliazzo. Hard-core distributions for somewhat hard problems, In 36th FOCS, pages 538-545, 1995.
-
(1995)
36th FOCS
, pp. 538-545
-
-
Impagliazzo, R.1
-
9
-
-
0024770898
-
One-way functions are essential for complexity based cryptography
-
R. Impagliazzo and M. Luby. One-way functions are essential for complexity based cryptography. In 30th FOCS, pages 230-235, 1989.
-
(1989)
30th FOCS
, pp. 230-235
-
-
Impagliazzo, R.1
Luby, M.2
-
10
-
-
0024866742
-
Limits on the provable consequences of one-way permutations
-
R. Impagliazzo and S. Rudich. Limits on the provable consequences of one-way permutations. In 21st STOC, pages 44-61, 1989.
-
(1989)
21st STOC
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
11
-
-
0033352133
-
Boosting and hard-core sets
-
A. R. Klivans and R. A. Servedio. Boosting and hard-core sets. In 40th FOCS, pages 624-633, 1999.
-
(1999)
40th FOCS
, pp. 624-633
-
-
Klivans, A.R.1
Servedio, R.A.2
-
12
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. Siam J. on Comp., 17(2):373-386, 1988.
-
(1988)
Siam J. on Comp.
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
13
-
-
0027599802
-
Secret key agreement by public discussion
-
U. Maurer. Secret key agreement by public discussion. IEEE Trans. on Inf. Theory, 39(3):733-742, 1993.
-
(1993)
IEEE Trans. on Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
14
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
U. Maurer and S. Wolf. Unconditionally secure key agreement and the intrinsic conditional information. IEEE Trans. on Inf. Theory, 45(2):499-514, 1999.
-
(1999)
IEEE Trans. on Inf. Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.1
Wolf, S.2
-
15
-
-
0002448405
-
A public key cryptosystern based on algebraic coding theory
-
Jet Propulsion Lab, NASA
-
R. J. McEliece. A public key cryptosystern based on algebraic coding theory. DSN Progress Report 42-44:114-116, Jet Propulsion Lab, NASA, 1978.
-
(1978)
DSN Progress Report
, vol.42-44
, pp. 114-116
-
-
McEliece, R.J.1
-
16
-
-
35248888499
-
New bounds in secret-key agreement: The gap between formation and secrecy extraction
-
E. Biham, ed., EUROCRYPT 2003
-
R. Renner and S. Wolf. New bounds in secret-key agreement: The gap between formation and secrecy extraction, In E. Biham, ed., EUROCRYPT 2003, volume 2656 of LNCS, pages 562-577, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 562-577
-
-
Renner, R.1
Wolf, S.2
-
17
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adelman, A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM, 21(2):120-126, 1978.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adelman, L.M.3
-
18
-
-
85029486638
-
The use of interaction in public cryptosystems
-
J. Feigenbaum, ed., CRYPTO '91
-
S. Rudich. The use of interaction in public cryptosystems. In J. Feigenbaum, ed., CRYPTO '91, volume 576 of LNCS, pages 242-251, 1991.
-
(1991)
LNCS
, vol.576
, pp. 242-251
-
-
Rudich, S.1
-
19
-
-
0025448521
-
The strength of weak learnability
-
R. E. Schapire, The strength of weak learnability, Machine Learning, 5(2):197-227, 1990.
-
(1990)
Machine Learning
, vol.5
, Issue.2
, pp. 197-227
-
-
Schapire, R.E.1
-
20
-
-
0344981500
-
List-decoding using the XOR lemma
-
L. Trevisan. List-decoding using the XOR lemma. In 44th FOCS, pages 126-135, 2003.
-
(2003)
44th FOCS
, pp. 126-135
-
-
Trevisan, L.1
-
21
-
-
21244466146
-
Zur Theorie der Gesellschaftsspiele
-
J. von Neumann. Zur Theorie der Gesellschaftsspiele. Mathematische Annalen, 100:295-320, 1928.
-
(1928)
Mathematische Annalen
, vol.100
, pp. 295-320
-
-
Von Neumann, J.1
-
22
-
-
0004203012
-
-
John Wiley & Sons Ltd, and B. G. Teubner, Stuttgart. ISBN 0-471-91555-6, available on ECCC
-
I. Wegener. The Complexity of Boolean Functions. John Wiley & Sons Ltd, and B. G. Teubner, Stuttgart, 1987. ISBN 0-471-91555-6, available on ECCC.
-
(1987)
The Complexity of Boolean Functions
-
-
Wegener, I.1
|