-
1
-
-
38049005705
-
Asymptotically optimal two-round perfectly secure message transmission
-
Springer-Verlag
-
S. Agarwal, R. Cramer, and R. de Haan. Asymptotically optimal two-round perfectly secure message transmission. In Advances in Cryptology: CRYPTO '06. Springer-Verlag, 2006.
-
(2006)
Advances in Cryptology: CRYPTO '06
-
-
Agarwal, S.1
Cramer, R.2
de Haan, R.3
-
4
-
-
0004089708
-
Error correction of algebraic block codes
-
US Patent 4,633,470
-
E. Berlekamp and L. Welch. Error correction of algebraic block codes. US Patent 4,633,470.
-
-
-
Berlekamp, E.1
Welch, L.2
-
5
-
-
0003661492
-
Bit optimal distributed consensus
-
Plenum Publishing Corporation
-
P. Berman, J. A. Garay, and K. J. Perry. Bit optimal distributed consensus. In Computer Science Research, pages 313-322. Plenum Publishing Corporation, 1992.
-
(1992)
Computer Science Research
, pp. 313-322
-
-
Berman, P.1
Garay, J.A.2
Perry, K.J.3
-
6
-
-
0023436302
-
(log n) expected rounds randomized Byzantine generals protocol
-
Oct
-
G. Bracha. An O(log n) expected rounds randomized Byzantine generals protocol. Journal of the Association for Computing Machinery, 34(4):910-920, Oct. 1987.
-
(1987)
Journal of the Association for Computing Machinery
, vol.34
, Issue.4
, pp. 910-920
-
-
Bracha, G.1
An, O.2
-
7
-
-
0026839969
-
Modular construction of a Byzantine agreement protocol with optimal message bit complexity
-
Mar
-
B. A. Coan and J. L. Welch. Modular construction of a Byzantine agreement protocol with optimal message bit complexity. Information and Computation, 97(1):61-85, Mar. 1992.
-
(1992)
Information and Computation
, vol.97
, Issue.1
, pp. 61-85
-
-
Coan, B.A.1
Welch, J.L.2
-
8
-
-
0027341860
-
Perfectly secure message transmission
-
Jan
-
D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. Journal of the ACM, 40(0):17-47, Jan. 1993.
-
(1993)
Journal of the ACM
, vol.40
, Issue.0
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
9
-
-
0042033407
-
Fault tolerance in networks of bounded degree
-
C. Dwork, D. Peleg, N. Pippinger, and E. Upfal. Fault tolerance in networks of bounded degree. In Proceedings of the 18th Annual ACM Symposium on Theory of Computing (STOC '86), pages 370-379, 1986.
-
(1986)
Proceedings of the 18th Annual ACM Symposium on Theory of Computing (STOC '86)
, pp. 370-379
-
-
Dwork, C.1
Peleg, D.2
Pippinger, N.3
Upfal, E.4
-
11
-
-
33745999816
-
Player simulation and general adversary structures in perfect multiparty computation
-
Winter
-
M. Hirt and U. Maurer. Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology, 13(1):31-60, Winter 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 31-60
-
-
Hirt, M.1
Maurer, U.2
-
12
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
Mar
-
W. Hoeffding. Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association, 58(301): 13-30, Mar. 1963.
-
(1963)
Journal of the American Statistical Association
, vol.58
, Issue.301
, pp. 13-30
-
-
Hoeffding, W.1
-
14
-
-
84976699318
-
The Byzantine generals problem
-
July
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Trans. Prog. Lang. Syst., 4(3):382-401, July 1982.
-
(1982)
ACM Trans. Prog. Lang. Syst
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
17
-
-
0012527611
-
Efficient perfectly secure message transmission in synchronous networks
-
H. Sayeed and H. Abu-Amara. Efficient perfectly secure message transmission in synchronous networks. Information and Communication, 126(1):53-61, 1996.
-
(1996)
Information and Communication
, vol.126
, Issue.1
, pp. 53-61
-
-
Sayeed, H.1
Abu-Amara, H.2
-
18
-
-
35048814566
-
Optimal perfectly secure message transmission
-
Advances in Cryptology: CRYPTO '04, of, Springer-Verlag
-
K. Srinathan, A. Narayanan, and C. Pandu Rangan. Optimal perfectly secure message transmission. In Advances in Cryptology: CRYPTO '04, volume 3152 of Lecture Notes in Computer Science, pages 545-561. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 545-561
-
-
Srinathan, K.1
Narayanan, A.2
Pandu Rangan, C.3
|