-
1
-
-
70349358874
-
More on average case vs approximation complexity
-
Alekhnovich, M.: More on average case vs approximation complexity. In: Proc. 44th FOCS, pp. 298-307 (2003)
-
(2003)
Proc. 44th FOCS
, pp. 298-307
-
-
Alekhnovich, M.1
-
2
-
-
33745306666
-
Computationally private randomizing polynomials and their applications
-
Applebaum, B., Ishai, Y., Kushilevitz, E.: Computationally private randomizing polynomials and their applications. Computional Complexity 15(2), 115-162 (2006)
-
(2006)
Computional Complexity
, vol.15
, Issue.2
, pp. 115-162
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
5
-
-
84877639283
-
Cryptographic primitives based on hard learning problems
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Blum, A., Furst, M., Kearns, M., Lipton, R.J.: Cryptographic primitives based on hard learning problems. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 278-291. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 278-291
-
-
Blum, A.1
Furst, M.2
Kearns, M.3
Lipton, R.J.4
-
7
-
-
84974667602
-
-
0. In: Sgall, J., Pultr, A., Kolman, P. (eds.) MFCS 2001. LNCS, 2136, pp. 272-284. Springer, Heidelberg (2001)
-
0. In: Sgall, J., Pultr, A., Kolman, P. (eds.) MFCS 2001. LNCS, vol. 2136, pp. 272-284. Springer, Heidelberg (2001)
-
-
-
-
8
-
-
0027986369
-
A minimal model for secure computation (extended abstract)
-
Feige, U., Killian, J., Naor, M.: A minimal model for secure computation (extended abstract). In: Proc. of the 26th STOC, pp. 554-563 (1994)
-
(1994)
Proc. of the 26th STOC
, pp. 554-563
-
-
Feige, U.1
Killian, J.2
Naor, M.3
-
12
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. of the ACM. 33, 792-807 (1986)
-
(1986)
J. of the ACM
, vol.33
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
13
-
-
0027797493
-
On the existence of pseudorandom generators
-
Goldreich, O., Krawczyk, H., Luby, M.: On the existence of pseudorandom generators. SIAM J. Comput. 22(6), 1163-1175 (1993)
-
(1993)
SIAM J. Comput
, vol.22
, Issue.6
, pp. 1163-1175
-
-
Goldreich, O.1
Krawczyk, H.2
Luby, M.3
-
14
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
Goldreich, O., Levin, L.: A hard-core predicate for all one-way functions. In: Proc. 21st STOC, pp. 25-32 (1989)
-
(1989)
Proc. 21st STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.2
-
15
-
-
0024866111
-
Pseudorandom generation from one-way functions
-
Impagliazzo, R., Levin, L.A., Luby, M.: Pseudorandom generation from one-way functions. In: Proc. 21st STOC, pp. 12-24 (1989)
-
(1989)
Proc. 21st STOC
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
16
-
-
0003502009
-
Randomizing polynomials: A new representation with applications to round-efficient secure computation
-
Ishai, Y., Kushilevitz, E.: Randomizing polynomials: A new representation with applications to round-efficient secure computation. In: Proc. 41st FOCS, pp. 294304 (2000)
-
(2000)
Proc. 41st FOCS
, pp. 294304
-
-
Ishai, Y.1
Kushilevitz, E.2
-
17
-
-
84869164571
-
Perfect constant-round secure computation via perfect randomizing polynomials
-
Widmayer, P, Triguero, F, Morales, R, Hennessy, M, Eidenbenz, S, Conejo, R, eds, ICALP 2002, Springer, Heidelberg
-
Ishai, Y., Kushilevitz, E.: Perfect constant-round secure computation via perfect randomizing polynomials. In: Widmayer, P., Triguero, F., Morales, R., Hennessy, M., Eidenbenz, S., Conejo, R. (eds.) ICALP 2002. LNCS, vol. 2380, pp. 244-256. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2380
, pp. 244-256
-
-
Ishai, Y.1
Kushilevitz, E.2
-
18
-
-
0346871653
-
-
Janwa, H., Moreno, O.: Mceliece public key cryptosystems using algebraicgeometric codes. Des. Codes Cryptography 8(3), 293-307 (1996)
-
Janwa, H., Moreno, O.: Mceliece public key cryptosystems using algebraicgeometric codes. Des. Codes Cryptography 8(3), 293-307 (1996)
-
-
-
-
19
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
Kilián, J.: Founding cryptography on oblivious transfer. In: Proc. 20th STOC, pp. 20-31 (1988)
-
(1988)
Proc. 20th STOC
, pp. 20-31
-
-
Kilián, J.1
-
20
-
-
0027627287
-
Constant depth circuits, fourier transform, and learnability
-
Linial, N., Mansour, Y., Nisan, N.: Constant depth circuits, fourier transform, and learnability. J. ACM 40(3), 607-620 (1993)
-
(1993)
J. ACM
, vol.40
, Issue.3
, pp. 607-620
-
-
Linial, N.1
Mansour, Y.2
Nisan, N.3
-
21
-
-
38049170419
-
-
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Technical Report DSN PR 42-44, Jet Prop. Lab (1978)
-
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Technical Report DSN PR 42-44, Jet Prop. Lab (1978)
-
-
-
-
23
-
-
0032647187
-
Synthesizers and their application to the parallel construction of pseudo-random functions
-
Naor, M., Reingold, O.: Synthesizers and their application to the parallel construction of pseudo-random functions. J. of Computer and Systems Sciences 58(2), 336-375 (1999)
-
(1999)
J. of Computer and Systems Sciences
, vol.58
, Issue.2
, pp. 336-375
-
-
Naor, M.1
Reingold, O.2
-
24
-
-
0026366408
-
Optimization, approximation, and complexity classes
-
Papadimitriou, C., Yannakakis, M.: Optimization, approximation, and complexity classes. J. of Computer and Systems Sciences 43, 425-440 (1991)
-
(1991)
J. of Computer and Systems Sciences
, vol.43
, pp. 425-440
-
-
Papadimitriou, C.1
Yannakakis, M.2
-
26
-
-
0000479182
-
Estimate of the number of signals in error correcting codes
-
Varshamov, R.: Estimate of the number of signals in error correcting codes. Doklady Akademii Nauk SSSR 117, 739-741 (1957)
-
(1957)
Doklady Akademii Nauk SSSR
, vol.117
, pp. 739-741
-
-
Varshamov, R.1
|