-
1
-
-
84974588386
-
Timed Commitments
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Boneh, D., Naor, M.: Timed Commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 236-254. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
2
-
-
84958598231
-
Unconditional Security Against Memory-Bounded Adversaries
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Cachin, C. Maurer, U.: Unconditional Security Against Memory-Bounded Adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 292-306. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 292-306
-
-
Cachin, C.1
Maurer, U.2
-
3
-
-
85069084234
-
-
Ding, Y., Harnik, D., Shltiel, R., Rosen, A.: Constant-Round Oblivious Transfer in the Bounded Storage Model. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, Springer, Heidelberg (2004)
-
Ding, Y., Harnik, D., Shltiel, R., Rosen, A.: Constant-Round Oblivious Transfer in the Bounded Storage Model. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, Springer, Heidelberg (2004)
-
-
-
-
4
-
-
33748094970
-
On the randomness complexity of efficient sampling
-
Dubrov, B., Ishai, Y.: On the randomness complexity of efficient sampling. In: Proceedings of STOC 2006, pp. 711-720 (2006)
-
(2006)
Proceedings of STOC 2006
, pp. 711-720
-
-
Dubrov, B.1
Ishai, Y.2
-
5
-
-
0033294770
-
Rigorous Time/Space Trade-offs for Inverting Functions
-
Fiat, A., Naor, M.: Rigorous Time/Space Trade-offs for Inverting Functions. SIAM J. Comput. 29(3), 790-803 (1999)
-
(1999)
SIAM J. Comput
, vol.29
, Issue.3
, pp. 790-803
-
-
Fiat, A.1
Naor, M.2
-
6
-
-
0034497243
-
The Relationship between Public Key Encryption and Oblivious Transfer
-
Gertner, Y., Kannan, S., Malkin, T. Reingold, O., Viswanathan, M.: The Relationship between Public Key Encryption and Oblivious Transfer. In: Proc. of the 41st Annual Symposium on Foundations of Computer Science (FOCS) (2000)
-
(2000)
Proc. of the 41st Annual Symposium on Foundations of Computer Science (FOCS)
-
-
Gertner, Y.1
Kannan, S.2
Malkin, T.3
Reingold, O.4
Viswanathan, M.5
-
8
-
-
0024868772
-
A Hard-Core Predicate for all One-Way Functions
-
Goldreich, O., Levin, L.: A Hard-Core Predicate for all One-Way Functions. In: STOC 1989, pp. 25-32 (1989)
-
(1989)
STOC 1989
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.2
-
9
-
-
17744387205
-
On Yao's XOR lemma
-
Technical Report TR95-50, Electronic Colloquium, on Computational Complexity
-
Goldreich, O., Nisan, N., Wigderson, A.: On Yao's XOR lemma. Technical Report TR95-50, Electronic Colloquium, on Computational Complexity (1995)
-
(1995)
-
-
Goldreich, O.1
Nisan, N.2
Wigderson, A.3
-
11
-
-
33746342808
-
Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions
-
Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
-
Haitner, I., Harnik, D., Reingold, O.: Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 228-239. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 228-239
-
-
Haitner, I.1
Harnik, D.2
Reingold, O.3
-
12
-
-
0019038335
-
A Cryptanalytic Time-Memory Trade-Off
-
Hellman, M.E.: A Cryptanalytic Time-Memory Trade-Off. IEEE Transactions on Information Theory IT-26(4), 401-406 (1980)
-
(1980)
IEEE Transactions on Information Theory
, vol.IT-26
, Issue.4
, pp. 401-406
-
-
Hellman, M.E.1
-
13
-
-
34848917325
-
Key Agreement from Weak Bit Agreement
-
Holenstein, T.: Key Agreement from Weak Bit Agreement. In: Proceedings of STOC 2005, pp. 664-673 (2005)
-
(2005)
Proceedings of STOC 2005
, pp. 664-673
-
-
Holenstein, T.1
-
14
-
-
33745580685
-
-
Holenstein, T.: Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 443-461. Springer, Heidelberg (2006)
-
Holenstein, T.: Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 443-461. Springer, Heidelberg (2006)
-
-
-
-
15
-
-
0024770898
-
One-Way Functions are Essential, for Complexity-Based Cryptography
-
IEEE, Los Alamitos
-
Impagliazzo, R., Luby, M.: One-Way Functions are Essential, for Complexity-Based Cryptography. In: 30th IEEE Symposium on Foundations of Computer Science (FOCS), pp. 230-235. IEEE, Los Alamitos (1989)
-
(1989)
30th IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 230-235
-
-
Impagliazzo, R.1
Luby, M.2
-
17
-
-
51249173191
-
-
Levin, L.A.: One-Way Functions and Pseudorandom Generators. Combinatorica 7(4), 357-363 (1987) Earlier version in STOC 1985
-
Levin, L.A.: One-Way Functions and Pseudorandom Generators. Combinatorica 7(4), 357-363 (1987) Earlier version in STOC 1985
-
-
-
-
18
-
-
0026698501
-
Conditionally-Perfect Secrecy and a Provably Secure Randomized Cipher
-
Maurer, U.: Conditionally-Perfect Secrecy and a Provably Secure Randomized Cipher. Journal of Cryptology 5(1), 53-66 (1992)
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.1
-
19
-
-
0017959977
-
Secure communications over insecure channels
-
April
-
Merkle, R.: Secure communications over insecure channels. CACM, 294-299 (April 1978)
-
(1978)
CACM
, vol.294-299
-
-
Merkle, R.1
-
20
-
-
35048815001
-
-
Reingold, O., Trevisan, L., Vadhan, S.: Notions of Reducibility between Cryptgraphic Primitives. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 1-20. Springer, Heidelberg (2004)
-
Reingold, O., Trevisan, L., Vadhan, S.: Notions of Reducibility between Cryptgraphic Primitives. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 1-20. Springer, Heidelberg (2004)
-
-
-
-
21
-
-
85069060084
-
-
Rudich, S, Limits on the Provable Consequences of One-way Functions. Ph.D. thesis
-
Rudich, S.: Limits on the Provable Consequences of One-way Functions. Ph.D. thesis
-
-
-
-
22
-
-
0142051871
-
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantom Computer
-
Shor, P.W.: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantom Computer. SIAM J. Comp. 26(5), 1484-1509 (1997)
-
(1997)
SIAM J. Comp
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
23
-
-
33745541383
-
On obfuscating point functions
-
Wee, H.: On obfuscating point functions. In: STOC 2005, pp. 523-532 (2005)
-
(2005)
STOC 2005
, pp. 523-532
-
-
Wee, H.1
|