-
1
-
-
0001063035
-
Strengths and weaknesses of quantum computing
-
Oct
-
C. H. Bennett, E. Bernstein, G. Brassard, and U. Vazirani, "Strengths and weaknesses of quantum computing," SIAM J. Comput., vol. 26, no. 5, pp. 1510-1523, Oct. 1997.
-
(1997)
SIAM J. Comput
, vol.26
, Issue.5
, pp. 1510-1523
-
-
Bennett, C.H.1
Bernstein, E.2
Brassard, G.3
Vazirani, U.4
-
3
-
-
0004089708
-
Error correction of algebraic block codes,
-
U.S. Patent 4 633 470
-
E. R. Berlekamp and L. Welch, "Error correction of algebraic block codes," U.S. Patent 4 633 470, 1986.
-
(1986)
-
-
Berlekamp, E.R.1
Welch, L.2
-
4
-
-
34248585738
-
Decoding interleaved Reed-Solomon codes over noisy channels
-
D. Bleichenbacher, A. Kiayias, and M. Yung, "Decoding interleaved Reed-Solomon codes over noisy channels," Theor. Comput. Sci., vol. 379, no. 3, pp. 348-360, 2007.
-
(2007)
Theor. Comput. Sci
, vol.379
, Issue.3
, pp. 348-360
-
-
Bleichenbacher, D.1
Kiayias, A.2
Yung, M.3
-
5
-
-
84948951675
-
-
D. Bleichenbacher and P. Nguyen, Noisy polynomial interpolation and noisy Chinese remaindering, in Lecture Notes in Computer Science ser. 1807, B. Preneel, Ed. Berlin, Germany: Springer-Verlag, 2000, pp. 53-69.
-
D. Bleichenbacher and P. Nguyen, "Noisy polynomial interpolation and noisy Chinese remaindering," in Lecture Notes in Computer Science ser. 1807, B. Preneel, Ed. Berlin, Germany: Springer-Verlag, 2000, pp. 53-69.
-
-
-
-
6
-
-
84949995981
-
An efficient probabilistic public-key encryption scheme which hides all partial information
-
G. R. Blakley and D. Chaum, Eds. Berlin, Germany: Springer-Verlag
-
M. Blum and S. Goldwasser, "An efficient probabilistic public-key encryption scheme which hides all partial information," in Lecture Notes in Computer Science, ser. 196, G. R. Blakley and D. Chaum, Eds. Berlin, Germany: Springer-Verlag, 1984.
-
(1984)
Lecture Notes in Computer Science
, vol.196
-
-
Blum, M.1
Goldwasser, S.2
-
7
-
-
0038447028
-
Reconstructing curves in three (and higher) dimensional space from noisy data
-
San Diego, CA, Jun. 9-11
-
D. Coppersmith and M. Sudan, "Reconstructing curves in three (and higher) dimensional space from noisy data," in Proc. 35th Annu. ACM Symp. Theory Comput., San Diego, CA, Jun. 9-11, 2003, pp. 136-142.
-
(2003)
Proc. 35th Annu. ACM Symp. Theory Comput
, pp. 136-142
-
-
Coppersmith, D.1
Sudan, M.2
-
8
-
-
0025430107
-
A note on computational indistinguishability
-
O. Goldreich, "A note on computational indistinguishability," Inf. Process. Lett., vol. 34, no. 6, pp. 277-281, 1990.
-
(1990)
Inf. Process. Lett
, vol.34
, Issue.6
, pp. 277-281
-
-
Goldreich, O.1
-
9
-
-
0027306732
-
A uniform complexity treatment of encryption and zero-knowledge
-
O. Goldreich, "A uniform complexity treatment of encryption and zero-knowledge," J. Cryptology, vol. 6, pp. 21-53, 1993.
-
(1993)
J. Cryptology
, vol.6
, pp. 21-53
-
-
Goldreich, O.1
-
11
-
-
0006238804
-
-
O. Goldreich, R. Rubinfeld, and M. Sudan, Learning polynomials with queries: The highly noisy case, SIAM J. Discrete Math., 13, no. 4, pp. 535-570, 2000.
-
O. Goldreich, R. Rubinfeld, and M. Sudan, "Learning polynomials with queries: The highly noisy case," SIAM J. Discrete Math., vol. 13, no. 4, pp. 535-570, 2000.
-
-
-
-
12
-
-
0021409284
-
Probabilistic encryption
-
Apr
-
S. Goldwasser and S. Micali, "Probabilistic encryption," J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, Apr. 1984.
-
(1984)
J. Comput. Syst. Sci
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
13
-
-
0033183669
-
Improved decoding of Reed-Solomon and algebraic-geometry codes
-
Sep
-
V. Guruswami and M. Sudan, "Improved decoding of Reed-Solomon and algebraic-geometry codes," IEEE Trans. Inf. Theory, vol. 45, no. 6, pp. 1757-1767, Sep. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.6
, pp. 1757-1767
-
-
Guruswami, V.1
Sudan, M.2
-
14
-
-
0345253860
-
Construction of a pseudo-random generator from any one-way function
-
J. Hastad, R. Impagliazzo, L. Levin, and M. Luby, "Construction of a pseudo-random generator from any one-way function," SIAM J. Comput. vol. 28, no. 4, pp. 1364-1396, 1999.
-
(1999)
SIAM J. Comput
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
15
-
-
2642543148
-
Polynomial reconstruction based cryptography,
-
Ph.D. dissertation, Comput. Sci. Dept, City Univ. New York, New York
-
A. Kiayias, "Polynomial reconstruction based cryptography," Ph.D. dissertation, Comput. Sci. Dept., City Univ. New York, New York, 2002.
-
(2002)
-
-
Kiayias, A.1
-
16
-
-
84869164138
-
Cryptographic hardness based on the de-coding of Reed Solomon codes
-
P. Widmayer, F. T. Ruiz, R. M. Bueno, M. Hennessy, S. Eidenbenz, and R. Conejo, Eds. Berlin, Germany: Springer-Verlag
-
A. Kiayias and M. Yung, "Cryptographic hardness based on the de-coding of Reed Solomon codes," in Lecture Notes in Computer Science, ser. 2380, P. Widmayer, F. T. Ruiz, R. M. Bueno, M. Hennessy, S. Eidenbenz, and R. Conejo, Eds. Berlin, Germany: Springer-Verlag, 2002, pp. 232-243.
-
(2002)
Lecture Notes in Computer Science
, vol.2380
, pp. 232-243
-
-
Kiayias, A.1
Yung, M.2
-
17
-
-
2642529529
-
Directions in polynomial reconstruction based cryptography
-
May
-
A. Kiayias and M. Yung, "Directions in polynomial reconstruction based cryptography," IEICE Trans., vol. E87-A, no. 5, pp. 978-985, May 2004.
-
(2004)
IEICE Trans
, vol.E87-A
, Issue.5
, pp. 978-985
-
-
Kiayias, A.1
Yung, M.2
-
18
-
-
29644436249
-
Characterization of security notions for probabilistic private-key encryption
-
J. Katz and M. Yung, "Characterization of security notions for probabilistic private-key encryption," J. Cryptology, vol. 19, no. 1, pp. 67-95, 2006.
-
(2006)
J. Cryptology
, vol.19
, Issue.1
, pp. 67-95
-
-
Katz, J.1
Yung, M.2
-
21
-
-
0001448484
-
Bit commitment using pseudorandomness
-
M. Naor, "Bit commitment using pseudorandomness," J. Cryptology, vol. 4, no. 2, pp. 151-158, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.2
, pp. 151-158
-
-
Naor, M.1
-
22
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
Atlanta, GA, May 1-4
-
M. Naor and B. Pinkas, "Oblivious transfer and polynomial evaluation," in Proc. T31st Annu. ACM Symp. Theory Comput., Atlanta, GA, May 1-4, 1999, pp. 245-254.
-
(1999)
Proc. T31st Annu. ACM Symp. Theory Comput
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
23
-
-
33750199090
-
Oblivious polynomial evaluation
-
M. Naor and B. Pinkas, "Oblivious polynomial evaluation," SIAM J. Comput., vol. 35, no. 5, pp. 1254-1281, 2006.
-
(2006)
SIAM J. Comput
, vol.35
, Issue.5
, pp. 1254-1281
-
-
Naor, M.1
Pinkas, B.2
-
24
-
-
0031332843
-
Number-theoretic constructions of efficient pseudo-random functions
-
Miami Beach, FL, Oct. 19-22
-
M. Naor and O. Reingold, "Number-theoretic constructions of efficient pseudo-random functions," in Proc. 38th Annu. Symp. Found. Comput. Sci., Miami Beach, FL, Oct. 19-22, 1997, pp. 458-467.
-
(1997)
Proc. 38th Annu. Symp. Found. Comput. Sci
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
25
-
-
33646831750
-
Correcting errors beyond the Guruswami-Sudan radius
-
Pittsburgh, PA, Oct. 23-25
-
F. Parvaresh and A. Vardy, "Correcting errors beyond the Guruswami-Sudan radius," in Proc. 46th Annu. IEEE Symp. Found. Comput. Sci., Pittsburgh, PA, Oct. 23-25, 2005, vol. 2005, pp. 285-294.
-
(2005)
Proc. 46th Annu. IEEE Symp. Found. Comput. Sci
, vol.2005
, pp. 285-294
-
-
Parvaresh, F.1
Vardy, A.2
-
26
-
-
0001174154
-
Polynomial codes over certain finite fields
-
I. Reed and G. Solomon, "Polynomial codes over certain finite fields," SIAM J. Appl. Math., vol. 8, no. 2, pp. 300-304, 1960.
-
(1960)
SIAM J. Appl. Math
, vol.8
, Issue.2
, pp. 300-304
-
-
Reed, I.1
Solomon, G.2
-
28
-
-
0031097176
-
Decoding of Reed Solomon codes beyond the error-correction bound
-
M. Sudan, "Decoding of Reed Solomon codes beyond the error-correction bound," J. Complexity, vol. 13, no. 1, pp. 180-193, 1997.
-
(1997)
J. Complexity
, vol.13
, Issue.1
, pp. 180-193
-
-
Sudan, M.1
-
29
-
-
0020301290
-
Theory and applications of trapdoor functions
-
Chicago, IL, Nov. 3-5
-
A. C. Yao, "Theory and applications of trapdoor functions," in Proc. 23rd Annu. Symp. Found. Comput. Sci., Chicago, IL, Nov. 3-5, 1982, pp. 80-91.
-
(1982)
Proc. 23rd Annu. Symp. Found. Comput. Sci
, pp. 80-91
-
-
Yao, A.C.1
|