-
1
-
-
1142301536
-
Continuity of Quantum Conditional Information
-
R. Alicki and M. Fannes, "Continuity of Quantum Conditional Information," J. Phys. A: Math. Gen., vol. 37, no. 5, pp. L55-L57, 2004.
-
(2004)
J. Phys. A: Math. Gen
, vol.37
, Issue.5
-
-
Alicki, R.1
Fannes, M.2
-
2
-
-
0029405656
-
Generalized Privacy Amplification
-
C. H. Bennett, G. Brassard, C. Crépeau, U. Maurer, "Generalized Privacy Amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
3
-
-
0003030602
-
Coin flipping by telephone: A protocol for solving impossible problems
-
M. Blum, "Coin flipping by telephone: a protocol for solving impossible problems," Proc. IEEE Computer Conference, pp. 133-137, 1982.
-
(1982)
Proc. IEEE Computer Conference
, pp. 133-137
-
-
Blum, M.1
-
4
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
G. Brassard, D. Chaum, C. Crépeau, "Minimum disclosure proofs of knowledge," J. Computer Syst. Sci., vol. 37, pp. 156-189, 1988.
-
(1988)
J. Computer Syst. Sci
, vol.37
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crépeau, C.3
-
5
-
-
84957356475
-
Efficient Cryptographic Protocols Based on Noisy Channels
-
Proc. EUROCRYPT '97, 1233, pp
-
C. Crépeau, "Efficient Cryptographic Protocols Based on Noisy Channels," Proc. EUROCRYPT '97. LNCS, vol. 1233, pp. 306-317, 1997.
-
(1997)
LNCS
, pp. 306-317
-
-
Crépeau, C.1
-
6
-
-
84864708144
-
Multi-party Computations Ensuring Privacy of Each Party's Input and Correctness of the Result
-
Proc. CRYPTO '87, 293, pp
-
D. Chaum, I. Damgård, and J. van de Graaf, "Multi-party Computations Ensuring Privacy of Each Party's Input and Correctness of the Result," Proc. CRYPTO '87. LNCS, vol. 293, pp. 87-119, 1988.
-
(1988)
LNCS
, pp. 87-119
-
-
Chaum, D.1
Damgård, I.2
van de Graaf, J.3
-
7
-
-
0024132071
-
Achieving oblivious transfer using weakened security assumptions
-
C. Crépeau, J. Kilian, "Achieving oblivious transfer using weakened security assumptions," Proc. 29th FOCS, IEEE, pp. 42-52, 1988.
-
(1988)
Proc. 29th FOCS, IEEE
, pp. 42-52
-
-
Crépeau, C.1
Kilian, J.2
-
8
-
-
0018456171
-
Universal Classes of hash functions
-
J.L. Carter, M.N. Wegman, "Universal Classes of hash functions," J. of Computer and Syst. Sci., vol. 18, pp. 143-154, 1979.
-
(1979)
J. of Computer and Syst. Sci
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
9
-
-
84957697395
-
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
-
Proc. EUROCRYPT '99
-
I. B. Damgård, J. Kilian, L. Salvail, "On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions", Proc. EUROCRYPT '99. LNCS, vol. 1592, pp. 56-73, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 56-73
-
-
Damgård, I.B.1
Kilian, J.2
Salvail, L.3
-
10
-
-
0022914590
-
Proofs that Yield Nothing but the Validity of the Assertion, and the Methodology of Cryptographic Protocol Design
-
O. Goldreich, S. Micali, A. Wigderson, "Proofs that Yield Nothing but the Validity of the Assertion, and the Methodology of Cryptographic Protocol Design," Proc. 27th IEEE FOCS. pp. 174-187, 1986.
-
(1986)
Proc. 27th IEEE FOCS
, pp. 174-187
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
11
-
-
0023545076
-
How to Play Any Mental Game, or: A completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, A. Wigderson, "How to Play Any Mental Game, or: A completeness theorem for protocols with honest majority," Proc. 19th ACM STOC. pp. 218-229, 1987.
-
(1987)
Proc. 19th ACM STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
12
-
-
0345253860
-
A Pseudorandom Generator from any one-way function
-
J. Håstad, R. Impagliazzo, L.A. Levin, M. Luby, "A Pseudorandom Generator from any one-way function," SIAM J. on Comp., vol. 28, no. 4., pp. 1364-1396, 1999.
-
(1999)
SIAM J. on Comp
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
13
-
-
5044248797
-
Rates for Bit Commitment and Coin Tossing from Noisy Correlation
-
H. Imai, J. Müller-Quade, A. C. A. Nascimento, A. Winter, "Rates for Bit Commitment and Coin Tossing from Noisy Correlation," Proc. IEEE ISIT '04. p. 47, 2004.
-
(2004)
Proc. IEEE ISIT '04
, pp. 47
-
-
Imai, H.1
Müller-Quade, J.2
Nascimento, A.C.A.3
Winter, A.4
-
14
-
-
84948960386
-
Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free
-
Proc. EUROCRYPT '00
-
U. Maurer and S. Wolf, "Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free," Proc. EUROCRYPT '00. LNCS, vol. 1807, pp. 351-368, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
15
-
-
0001448484
-
Bit commitment using pseudo-randomness
-
M. Naor, "Bit commitment using pseudo-randomness", J. Cryptology, vol. 2, no. 2, pp. 151-158, 1991.
-
(1991)
J. Cryptology
, vol.2
, Issue.2
, pp. 151-158
-
-
Naor, M.1
-
16
-
-
84856043672
-
A mathematical theory of communication
-
and
-
C. E. Shannon, "A mathematical theory of communication," Bell System Tech. J. vol. 27, pp. 379-423 and 623-656, 1948.
-
(1948)
Bell System Tech. J
, vol.27
-
-
Shannon, C.E.1
-
17
-
-
23944463739
-
Commitment Capacity of Discrete Memoryless Channels
-
Proc. 9th IMA International Conf. on Cryptography and Coding
-
A. Winter, A. C. A. Nascimento, H. Imai, "Commitment Capacity of Discrete Memoryless Channels", Proc. 9th IMA International Conf. on Cryptography and Coding, LNCS, vol. 2898, pp. 35-51, 2003.
-
(2003)
LNCS
, vol.2898
, pp. 35-51
-
-
Winter, A.1
Nascimento, A.C.A.2
Imai, H.3
-
18
-
-
19544368112
-
Zero-error information and applications in cryptography
-
S. Wolf, J. Wullschleger, "Zero-error information and applications in cryptography", Proc. IEEE ITW '04, 2004.
-
(2004)
Proc. IEEE ITW '04
-
-
Wolf, S.1
Wullschleger, J.2
|