-
1
-
-
70349358874
-
More on average case vs approximation complexity
-
M. Alekhnovich. More on average case vs approximation complexity. In Proc. 44th FOCS, pages 298-307, 2003.
-
(2003)
Proc. 44th FOCS
, pp. 298-307
-
-
Alekhnovich, M.1
-
2
-
-
0026834814
-
Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs
-
N. Alon, J. Bruck, J. Naor, M. Naor, and R. M. Roth. Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs. IEEE Transactions on Information Theory 38(2) (1992).
-
(1992)
IEEE Transactions on Information Theory
, vol.38
, Issue.2
-
-
Alon, N.1
Bruck, J.2
Naor, J.3
Naor, M.4
Roth, R.M.5
-
3
-
-
34547843026
-
-
B. Applebaum, Y. Ishai, and E. Kushilevitz. Cryptography in NC̊. SIAM J. Comput., 36(4):845-888, 2006. Earlier version in FOCS 2004.
-
B. Applebaum, Y. Ishai, and E. Kushilevitz. Cryptography in NC̊. SIAM J. Comput., 36(4):845-888, 2006. Earlier version in FOCS 2004.
-
-
-
-
4
-
-
33745306666
-
Computationally private randomizing polynomials and their applications
-
Earlier version in CCC
-
B. Applebaum, Y. Ishai, and E. Kushilevitz. Computationally private randomizing polynomials and their applications. Computional Complexity, 15(2): 115-162, 2006. Earlier version in CCC 2005.
-
(2005)
Computional Complexity
, vol.15
, Issue.2
, pp. 115-162
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
7
-
-
38049082907
-
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
-
Y. Aumann and Yehuda Lindell. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In Proc. TCC 2007, pages 137-156.
-
(2007)
Proc. TCC
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
8
-
-
84928743703
-
Precomputing oblivious transfer
-
D. Beaver. Precomputing oblivious transfer. In CRYPTO, pages 97-109, 1995.
-
(1995)
CRYPTO
, pp. 97-109
-
-
Beaver, D.1
-
9
-
-
0029702967
-
Correlated pseudorandomness and the complexity of private computations
-
D. Beaver. Correlated pseudorandomness and the complexity of private computations. In 28th STOC, pages 479-488, 1996.
-
(1996)
28th STOC
, pp. 479-488
-
-
Beaver, D.1
-
10
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. of 20th STOC, pages 1-10, 1988.
-
(1988)
Proc. of 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
11
-
-
0033702346
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
A. Blum, A. Kalai, and H. Wasserman. Noise-tolerant learning, the parity problem, and the statistical query model. In Proc. of 32nd STOC, pages 435-440, 2000.
-
(2000)
Proc. of 32nd STOC
, pp. 435-440
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
12
-
-
0021522644
-
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13:850-864, 1984. Preliminary version in FOCS 82.
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13:850-864, 1984. Preliminary version in FOCS 82.
-
-
-
-
13
-
-
0347057324
-
Inter-reciprocity applied to electrical networks
-
J. L. Bordewijk. Inter-reciprocity applied to electrical networks. Applied Scientific Research B: Electrophysics, Acoustics, Optics, Mathematical Methods, 6: 1-74, 1956.
-
(1956)
Applied Scientific Research B: Electrophysics, Acoustics, Optics, Mathematical Methods
, vol.6
, pp. 1-74
-
-
Bordewijk, J.L.1
-
14
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. In J. of Cryptology, 13(1), 2000.
-
(2000)
J. of Cryptology
, vol.13
, Issue.1
-
-
Canetti, R.1
-
15
-
-
84948973494
-
Exposure-Resilient Functions and All-or-Nothing Transforms
-
R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz, and A. Sahai. Exposure-Resilient Functions and All-or-Nothing Transforms. In Proc EUROCRYPT 2000, pages 453-469.
-
(2000)
Proc EUROCRYPT
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
17
-
-
0018456171
-
Universal Classes of Hash Functions
-
L. Carter and M. N. Wegman. Universal Classes of Hash Functions. J. Comput. Syst. Sci. 18(2): 143-154 (1979).
-
(1979)
J. Comput. Syst. Sci
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, L.1
Wegman, M.N.2
-
18
-
-
0022198802
-
The Bit Extraction Problem of t-Resilient Functions (Preliminary Version) In Proc
-
B. Chor, O. Goldreich, J. Haastad, J. Friedman, S. Rudich, and R. Smolensky. The Bit Extraction Problem of t-Resilient Functions (Preliminary Version) In Proc. FOCS 1985, pages 396-407.
-
(1985)
FOCS
, pp. 396-407
-
-
Chor, B.1
Goldreich, O.2
Haastad, J.3
Friedman, J.4
Rudich, S.5
Smolensky, R.6
-
22
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
23
-
-
0027986369
-
A minimal model for secure computation (extended abstract)
-
U. Feige, J. Killian, and M. Naor. A minimal model for secure computation (extended abstract). In Proc. of the 26th STOC, pages 554-563, 1994.
-
(1994)
Proc. of the 26th STOC
, pp. 554-563
-
-
Feige, U.1
Killian, J.2
Naor, M.3
-
28
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. ACM 33(4): 792-807, 1986.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
29
-
-
0020279669
-
Why and How to Establish a Private Code on a Public Network
-
S. Goldwasser, S. Micali, and P. Tong. Why and How to Establish a Private Code on a Public Network. In FOCS 1982, pages 134-144.
-
FOCS 1982
, pp. 134-144
-
-
Goldwasser, S.1
Micali, S.2
Tong, P.3
-
30
-
-
85032868051
-
How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design
-
O. Goldreich, S. Micali, and A. Wigderson. How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design. In CRYPTO 1986, pages 171-185.
-
CRYPTO 1986
, pp. 171-185
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
31
-
-
0035189692
-
Expander-Based Constructions of Efficiently Decodable Codes
-
V. Guruswami and P. Indyk. Expander-Based Constructions of Efficiently Decodable Codes. In Proc. FOCS 2001, pages 658-667.
-
(2001)
Proc. FOCS
, pp. 658-667
-
-
Guruswami, V.1
Indyk, P.2
-
32
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
R. Impagliazzo, L. A. Levin, and M. Luby. Pseudo-random generation from one-way functions. In Proc. STOC 1989, pages 12-24.
-
(1989)
Proc. STOC
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
33
-
-
84869164571
-
Perfect constant-round secure computation via perfect randomizing polynomials
-
Y. Ishai and E. Kushilevitz. Perfect constant-round secure computation via perfect randomizing polynomials. In Proc. 29th ICALP, pages 244-256, 2002.
-
(2002)
Proc. 29th ICALP
, pp. 244-256
-
-
Ishai, Y.1
Kushilevitz, E.2
-
35
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
J. Kilian. Founding cryptography on oblivious transfer. In 20th STOC, pages 20-31, 1988.
-
(1988)
20th STOC
, pp. 20-31
-
-
Kilian, J.1
-
36
-
-
26944487960
-
The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem
-
V. Lyubashevsky. The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem. In Proc. APPROX-RANDOM 2005, pages 378-389.
-
(2005)
Proc. APPROX-RANDOM
, pp. 378-389
-
-
Lyubashevsky, V.1
-
37
-
-
0025106672
-
The Computational Complexity of Universal Hashing
-
Y. Mansour, N. Nisan, and P. Tiwari. The Computational Complexity of Universal Hashing. In Proc. STOC 1990, pages 235-243.
-
(1990)
Proc. STOC
, pp. 235-243
-
-
Mansour, Y.1
Nisan, N.2
Tiwari, P.3
-
39
-
-
0027641832
-
Small-bias probability spaces: Efficient constructions and applications
-
J. Naor and M. Naor. Small-bias probability spaces: Efficient constructions and applications. SIAM J. Comput., 22(4):838-856, 1993.
-
(1993)
SIAM J. Comput
, vol.22
, Issue.4
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
40
-
-
0034819509
-
Communication preserving protocols for secure function evaluation
-
M. Naor and K. Nissim. Communication preserving protocols for secure function evaluation. In Proc. 33rd STOC, pages 590-599, 2001.
-
(2001)
Proc. 33rd STOC
, pp. 590-599
-
-
Naor, M.1
Nissim, K.2
-
41
-
-
0024867751
-
-
Moni Naor, Moti Yung. Universal One-Way Hash Functions and their Cryptographic Applications. In Proc. STOC 1989, pages 33-43.
-
Moni Naor, Moti Yung. Universal One-Way Hash Functions and their Cryptographic Applications. In Proc. STOC 1989, pages 33-43.
-
-
-
-
42
-
-
57049106530
-
-
M.O. Rabin. How to exchange secrets by oblivious transfer. TR-81, Harvard, 1981.
-
M.O. Rabin. How to exchange secrets by oblivious transfer. TR-81, Harvard, 1981.
-
-
-
-
44
-
-
57049171641
-
-
W. D. Smith. 1. AES seems weak. 2. Linear time secure cryptography. Cryplology ePrint report 2007/248.
-
W. D. Smith. 1. AES seems weak. 2. Linear time secure cryptography. Cryplology ePrint report 2007/248.
-
-
-
-
45
-
-
0005717392
-
Linear-time encodable and decodable error-correcting codes
-
D. A. Spielman. Linear-time encodable and decodable error-correcting codes. STOC 1995: 388-397
-
(1995)
STOC
, pp. 388-397
-
-
Spielman, D.A.1
-
46
-
-
0020301290
-
Theory and application of trapdoor functions
-
A. C. Yao. Theory and application of trapdoor functions. In Proc. 23rd FOCS, pages 80-91, 1982.
-
(1982)
Proc. 23rd FOCS
, pp. 80-91
-
-
Yao, A.C.1
-
47
-
-
0022882770
-
How to generate and exchange secrets
-
A. C. Yao. How to generate and exchange secrets. In Proc. 27th FOCS, pages 162-167, 1986.
-
(1986)
Proc. 27th FOCS
, pp. 162-167
-
-
Yao, A.C.1
|