-
2
-
-
0002803945
-
Quantum cryptography, or unforgeable subway tokens
-
Bennett, C.H., Brassard, G., Breidbard, S., Wiesner, S.: Quantum cryptography, or unforgeable subway tokens. In: CRYPTO 1982, pp. 267-275 (1982)
-
(1982)
CRYPTO 1982
, pp. 267-275
-
-
Bennett, C.H.1
Brassard, G.2
Breidbard, S.3
Wiesner, S.4
-
3
-
-
51849087086
-
-
Microprocessor for executing enciphered programs
-
Best, R.M.: Us patent 4,168,396: Microprocessor for executing enciphered programs (1979)
-
(1979)
Us patent
, vol.4
, pp. 168-396
-
-
Best, R.M.1
-
4
-
-
0003153237
-
Non-interactive zero-knowledge and its applications (extended abstract)
-
Chicago, Illinois, pp
-
Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications (extended abstract). In: STOC 1988, Chicago, Illinois, pp. 103-112 (1988)
-
(1988)
STOC
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
5
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.P.6
Yang, K.7
-
6
-
-
51849085942
-
-
Personal communication
-
Blum, M.: Personal communication (1981)
-
(1981)
-
-
Blum, M.1
-
7
-
-
0003384765
-
How to prove a theorem so no-one else can claim it
-
Blum, M.: How to prove a theorem so no-one else can claim it. In: Proceedings of ICML, pp. 1444-1451 (1987)
-
(1987)
Proceedings of ICML
, pp. 1444-1451
-
-
Blum, M.1
-
8
-
-
32844469026
-
Lower bounds for non-black-box zero knowledge
-
Barak, B., Lindell, Y., Vadhan, S.P.: Lower bounds for non-black-box zero knowledge. J. Comput. Syst. Sci. 72(2), 321-391 (2006)
-
(2006)
J. Comput. Syst. Sci
, vol.72
, Issue.2
, pp. 321-391
-
-
Barak, B.1
Lindell, Y.2
Vadhan, S.P.3
-
9
-
-
0020915882
-
Blind signatures for untraceable payments
-
Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO 1982, pp. 199-203 (1982)
-
(1982)
CRYPTO 1982
, pp. 199-203
-
-
Chaum, D.1
-
10
-
-
0003062028
-
Blind signature systems
-
Chaum, D.: Blind signature systems. In: CRYPTO 1983, pp. 153-156 (1983)
-
(1983)
CRYPTO 1983
, pp. 153-156
-
-
Chaum, D.1
-
11
-
-
33746975301
-
Virtual leashing: Creating a computational foundation for software protection
-
Dvir, O., Herlihy, M., Shavit, N.: Virtual leashing: Creating a computational foundation for software protection. Journal of Parallel and Distributed Computing (Special Issue) 66(9), 1233-1240 (2006)
-
(2006)
Journal of Parallel and Distributed Computing (Special Issue)
, vol.66
, Issue.9
, pp. 1233-1240
-
-
Dvir, O.1
Herlihy, M.2
Shavit, N.3
-
12
-
-
0022080529
-
A randomized protocol for signing contracts
-
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
13
-
-
0000108216
-
How to construct constant-round zero-knowledge proof systems for np
-
Goldreich, O., Kahan, A.: How to construct constant-round zero-knowledge proof systems for np. J. Cryptology 9(3), 167-190 (1996)
-
(1996)
J. Cryptology
, vol.9
, Issue.3
, pp. 167-190
-
-
Goldreich, O.1
Kahan, A.2
-
14
-
-
33748600953
-
-
Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: Tardos, É. (ed.) FOCS 2005, pp. 553-562. IEEE Computer Society, Los Alamitos (2005)
-
Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: Tardos, É. (ed.) FOCS 2005, pp. 553-562. IEEE Computer Society, Los Alamitos (2005)
-
-
-
-
15
-
-
35048896529
-
-
Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (atp) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 258-277. Springer, Heidelberg (2004)
-
Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (atp) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 258-277. Springer, Heidelberg (2004)
-
-
-
-
16
-
-
0024611659
-
The knowledge complexity of interactive proof-systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. SIAM Journal on Computing 18(1), 186-208 (1989)
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
17
-
-
71149116146
-
Proofs that yield nothing but their validity, or all languages in np have zero-knowledge proof systems
-
Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity, or all languages in np have zero-knowledge proof systems. Journal of the ACM 38(1), 691-729 (1991)
-
(1991)
Journal of the ACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
18
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious rams. Journal of the ACM 43(3), 431-473 (1996)
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
19
-
-
33746066725
-
Private circuits ii: Keeping secrets in tamperable circuits
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A., Wagner, D.: Private circuits ii: Keeping secrets in tamperable circuits. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 308-327. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 308-327
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
Wagner, D.4
-
20
-
-
35248830337
-
Private circuits: Securing hardware against probing attacks
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Ishai, Y., Sahai, A., Wagner, D.: Private circuits: Securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
21
-
-
38049150653
-
Universally composable multi-party computation using tamper-proof hardware
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Katz, J.: Universally composable multi-party computation using tamper-proof hardware. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 115-128. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 115-128
-
-
Katz, J.1
-
23
-
-
26444553313
-
Basingcryptographicprotocolsontamper-evidentseals
-
Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Moran,T.,Naor,M.:Basingcryptographicprotocolsontamper-evidentseals. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 285-297. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 285-297
-
-
Moran, T.1
Naor, M.2
-
24
-
-
35048852134
-
-
Micali, S., Reyzin, L.: Physically observable cryptography (extended abstract). In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 278-296. Springer, Heidelberg (2004)
-
Micali, S., Reyzin, L.: Physically observable cryptography (extended abstract). In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
-
-
-
-
25
-
-
44449101614
-
David and goliath commitments: Uc computation for asymmetric parties using tamper-proof hardware
-
Smart, N, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Moran, T., Segev, G.: David and goliath commitments: Uc computation for asymmetric parties using tamper-proof hardware. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 527-544. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 527-544
-
-
Moran, T.1
Segev, G.2
-
26
-
-
35248825608
-
On deniability in the common reference string and random oracle model
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Pass, R.: On deniability in the common reference string and random oracle model. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 316-337. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 316-337
-
-
Pass, R.1
-
27
-
-
77953754678
-
How to exchange secrets with oblivious transfer. Cryptology ePrint Archive
-
Report 2005/187
-
Rabin, M.O.: How to exchange secrets with oblivious transfer. Cryptology ePrint Archive, Report 2005/187 (2005)
-
(2005)
-
-
Rabin, M.O.1
-
28
-
-
33745125579
-
Non-interactive zero-knowledge with preprocessing
-
Goldwasser, S, ed, CRYPTO 1988, Springer, Heidelberg
-
De Santis, A., Micali, S., Persiano, G.: Non-interactive zero-knowledge with preprocessing. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 269-282. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.403
, pp. 269-282
-
-
De Santis, A.1
Micali, S.2
Persiano, G.3
-
29
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a tpm without a trusted os (extended version). Technical Report 2006-064
-
Sarmenta, L.F.G., van Dijk, M., O'Donnell, C.W., Rhodes, J., Devadas, S.: Virtual monotonic counters and count-limited objects using a tpm without a trusted os (extended version). Technical Report 2006-064, MIT CSAIL Technical Report (2006)
-
(2006)
MIT CSAIL Technical Report
-
-
Sarmenta, L.F.G.1
van Dijk, M.2
O'Donnell, C.W.3
Rhodes, J.4
Devadas, S.5
-
30
-
-
51849135296
-
-
Trusted computing group trusted platform module (tpm) specifications 2007
-
Trusted computing group trusted platform module (tpm) specifications (2007)
-
-
-
-
31
-
-
0022882770
-
How to generate and exchange secrets
-
Yao, A.C.: How to generate and exchange secrets. In: FOCS 1986, pp. 162-167 (1986)
-
(1986)
FOCS 1986
, pp. 162-167
-
-
Yao, A.C.1
|