-
1
-
-
84945134014
-
Priced Oblivious Transfer: How to Sell Digital Goods
-
Advances in Cryptology - Eurocrypt
-
B. Aiello, Y. Ishai, O. Reingold, "Priced Oblivious Transfer: How to Sell Digital Goods", Advances in Cryptology - Eurocrypt 2001, LNCS 2045, pp. 119-135
-
(2001)
LNCS
, vol.2045
, pp. 119-135
-
-
Aiello, B.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
84947271111
-
How to Break a 'Secure' Oblivious Transfer Protocol
-
Advances in Cryptology - Crypto '92
-
D. Beaver, "How to Break a 'Secure' Oblivious Transfer Protocol", Advances in Cryptology - Crypto '92, LNCS 658, pp. 285-296
-
LNCS
, vol.658
, pp. 285-296
-
-
Beaver, D.1
-
3
-
-
0027726717
-
Random Oracles are Practical: A paradigm for designing efficient protocols
-
Fairfax (Virginia) USA, ACM Press
-
M. Bellare, P. Rogaway, "Random Oracles are Practical: a paradigm for designing efficient protocols", Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62-73, Fairfax (Virginia) USA, 1993, ACM Press
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0842305659
-
Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information
-
R. Canetti, "Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information", Proceedings of Advances in Cryptology - Crypto '97, pp. 455-469
-
Proceedings of Advances in Cryptology - Crypto '97
, pp. 455-469
-
-
Canetti, R.1
-
5
-
-
0031619016
-
The Random Oracle Methodology, Revisited
-
ACM Press
-
R. Canetti, O. Goldreich, S. Halevi, "The Random Oracle Methodology, Revisited", Proceedings of the 30th Annual ACM Symposium on Theory of Computing (STOC) 1998, pp. 209-218, ACM Press
-
(1998)
Proceedings of the 30th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
6
-
-
0033332890
-
Magic Functions
-
C. Dwork, M. Naor, O. Reingold, L. Stockmeyer, "Magic Functions", Proceedings of the 40th Symposium of Foundations of Computer Science (FOCS) 1999, pp. 523-534
-
(1999)
Proceedings of the 40th Symposium of Foundations of Computer Science (FOCS)
, pp. 523-534
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Stockmeyer, L.4
-
7
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Advances in Cryptology - Crypto '84
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", Advances in Cryptology - Crypto '84, LNCS 196
-
LNCS
, vol.196
-
-
ElGamal, T.1
-
8
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
An earlier version appeared in [7]
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms" IEEE Transactions on Information Theory, 31 (1985), An earlier version appeared in [7]
-
(1985)
IEEE Transactions on Information Theory
, vol.31
-
-
ElGamal, T.1
-
10
-
-
0002337124
-
How to Play any Mental Game
-
O. Goldreich, M. Micali, A. Widgerson, "How to Play any Mental Game", Proceedings of the 19th ACM symposium on Theory of Computing (STOC), 1987, pp. 218-299
-
(1987)
Proceedings of the 19th ACM Symposium on Theory of Computing (STOC)
, pp. 218-299
-
-
Goldreich, O.1
Micali, M.2
Widgerson, A.3
-
16
-
-
84958985031
-
Efficient 1-out-n oblivious transfer schemes
-
Workshop on Practice and Theory in Public-Key Cryptography (PKC 02)
-
W. Tzeng, "Efficient 1-out-n oblivious transfer schemes", Workshop on Practice and Theory in Public-Key Cryptography (PKC 02), LNCS, 2002
-
(2002)
LNCS
-
-
Tzeng, W.1
|