-
5
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional sender and recipient untraceability
-
David Chaum. The Dining Cryptographers Problem: Unconditional sender and recipient untraceability. Journal of Cryptology, l(1):65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.50
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
8
-
-
0012610677
-
Limits on the security of coin flips when half the processors are faulty
-
ACM Press
-
Richard Cleve. Limits on the security of coin flips when half the processors are faulty. ACM Symposium on Theory of Computing (STOC '86), 364-369, ACM Press, 1986.
-
(1986)
ACM Symposium on Theory of Computing (STOC '86)
, pp. 364-369
-
-
Cleve, R.1
-
10
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
Springer-Verlag
-
Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, and Tal Rabin. Efficient multiparty computations secure against an adaptive adversary. Advances in Cryptology: EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, 311-326. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology: EUROCRYPT '99, Volume 1592 of Lecture Notes in Computer Science
, vol.1592
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
13
-
-
0001683636
-
Authenticated algorithms for Byzantine agreement
-
Danny Dolev and H. Raymond Strong. Authenticated algorithms for Byzantine agreement. SIAM Journal on Computing, 12(4):656-666, 1983.
-
(1983)
SIAM Journal on Computing
, vol.12
, Issue.4
, pp. 656-666
-
-
Dolev, D.1
Raymond Strong, H.2
-
14
-
-
0022562351
-
Easy impossibility proofs for distributed consensus problems
-
Michael J. Fischer, Nancy A. Lynch, and Michael Merritt. Easy impossibility proofs for distributed consensus problems. Distributed Computing, 1:26-39, 1986.
-
(1986)
Distributed Computing
, vol.1
, pp. 26-39
-
-
Fischer, M.J.1
Lynch, N.A.2
Merritt, M.3
-
15
-
-
0035914761
-
Quantum solution to the Byzantine agreement problem
-
Matthias Fitzi, Nicolas Gisin, and Ueli Maurer. Quantum solution to the Byzantine agreement problem. Physical Review Letters, 87(21):7901-l-7901-4, 2001.
-
(2001)
Physical Review Letters
, vol.87
, Issue.21
-
-
Fitzi, M.1
Gisin, N.2
Maurer, U.3
-
16
-
-
84947209216
-
Unconditional Byzantine agreement and multi-party computation secure against dishonest minorities from scratch
-
Springer-Verlag
-
Matthias Fitzi, Nicolas Gisin, Ueli Maurer, and Oliver von Rotz. Unconditional Byzantine agreement and multi-party computation secure against dishonest minorities from scratch. Advances in Cryptology: EUROCRYPT.'02, volume 2332 of Lecture Notes in Computer Science, 482-501. Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology: EUROCRYPT.'02, Volume 2332 of Lecture Notes in Computer Science
, vol.2332
, pp. 482-501
-
-
Fitzi, M.1
Gisin, N.2
Maurer, U.3
Von Rotz, O.4
-
19
-
-
0003605145
-
Constructing digital signatures from a one-way function
-
SRI International Computer Science Laboratory
-
Leslie Lamport. Constructing digital signatures from a one-way function. Technical Report SRI-CSL-98, SRI International Computer Science Laboratory, 1979.
-
(1979)
Technical Report SRI-CSL-98
-
-
Lamport, L.1
-
20
-
-
84976699318
-
The Byzantine generals problem
-
Leslie Lamport, Robert Shostak, and Marshall Pease. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401, 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
21
-
-
0027599802
-
Secret key agreement by public discussion
-
Ueli Maurer. Secret key agreement by public discussion. IEEE Transaction on Information'Theory, 39(3):733-742, 1993.
-
(1993)
IEEE Transaction on Information'Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
23
-
-
0037396695
-
Maurer and Stefan Wolf. Secret-key agreement over unauthenticated public channels Part I: Definitions and a completeness result
-
Ueli M. Maurer and Stefan Wolf. Secret-key agreement over unauthenticated public channels Part I: Definitions and a completeness result. IEEE Transactions on Information Theory, 49:822-831, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, pp. 822-831
-
-
Ueli, M.1
-
24
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels-Part II: The simulatability condition
-
Ueli M. Maurer and Stefan Wolf. Secret-key agreement over unauthenticated public channels-Part II: The simulatability condition. IEEE Transactions on Information Theory, 49:832-838, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, pp. 832-838
-
-
Maurer, U.M.1
Wolf, S.2
-
25
-
-
0003445668
-
Information-theoretic pseudosignatures and Byzantine agreement for t >= n/3
-
(#90830), IBM Research
-
Birgit Pfitzmann and Michael Waidner. Information-theoretic pseudosignatures and Byzantine agreement for t >= n/3. Technical Report RZ 2882 (#90830), IBM Research, 1996.
-
(1996)
Technical Report RZ 2882
-
-
Pfitzmann, B.1
Waidner, M.2
|