-
1
-
-
0031334110
-
Does parallel repetition lower the error in computationally sound protocols?
-
Bellare, M., Impagliazzo, R., Naor, M.: Does parallel repetition lower the error in computationally sound protocols? In: FOCS 1997, pp. 374-383 (1997)
-
(1997)
FOCS 1997
, pp. 374-383
-
-
Bellare, M.1
Impagliazzo, R.2
Naor, M.3
-
2
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
24144435673
-
-
Canetti, R., Halevi, S., Steiner, M.: Hardness amplification of weakly verifiable puzzles. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 17-33. Springer, Heidelberg (2005)
-
Canetti, R., Halevi, S., Steiner, M.: Hardness amplification of weakly verifiable puzzles. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 17-33. Springer, Heidelberg (2005)
-
-
-
-
4
-
-
38049123011
-
Amplifying collision resistance: A complexity-theoretic treatment
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Canetti, R., Rivest, R.L., Sudan, M., Trevisan, L., Vadhan, S.P., Wee, H.: Amplifying collision resistance: A complexity-theoretic treatment. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 264-283. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 264-283
-
-
Canetti, R.1
Rivest, R.L.2
Sudan, M.3
Trevisan, L.4
Vadhan, S.P.5
Wee, H.6
-
5
-
-
33745828152
-
Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Damgård, I.B., Nielsen, J.B.: Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 449-464. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 449-464
-
-
Damgård, I.B.1
Nielsen, J.B.2
-
6
-
-
70350281850
-
Security amplification for interactive cryptographic primitives
-
TCC
-
Dodis, Y., Impagliazzo, R., Jaiswal, R., Kabanets, V.: Security amplification for interactive cryptographic primitives. In: TCC 2009. LNCS, vol. 5444, pp. 128-145 (2009)
-
(2009)
LNCS
, vol.5444
, pp. 128-145
-
-
Dodis, Y.1
Impagliazzo, R.2
Jaiswal, R.3
Kabanets, V.4
-
7
-
-
35048881610
-
Immunizing encryption schemes from decryption errors
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Dwork, C., Naor, M., Reingold, O.: Immunizing encryption schemes from decryption errors. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 342-360. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 342-360
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
-
8
-
-
0022069123
-
On the power of cascade ciphers
-
Even, S., Goldreich, O.: On the power of cascade ciphers. ACM Trans. Comput. Syst. 3(2), 108-116 (1985)
-
(1985)
ACM Trans. Comput. Syst
, vol.3
, Issue.2
, pp. 108-116
-
-
Even, S.1
Goldreich, O.2
-
9
-
-
0025742358
-
Security preserving amplification of hardness
-
Goldreich, O., Impagliazzo, R., Levin, L.A., Venkatesan, R., Zuckerman, D.: Security preserving amplification of hardness. In: FOCS 1990, pp. 318-326 (1990)
-
(1990)
FOCS 1990
, pp. 318-326
-
-
Goldreich, O.1
Impagliazzo, R.2
Levin, L.A.3
Venkatesan, R.4
Zuckerman, D.5
-
10
-
-
2442638659
-
On Yao's XOR-lemma
-
Goldreich, O., Nisan, N., Wigderson, A.: On Yao's XOR-lemma. Electronic Colloquium on Computational Complexity (ECCC) 2(50) (1995)
-
(1995)
Electronic Colloquium on Computational Complexity (ECCC)
, vol.2
, Issue.50
-
-
Goldreich, O.1
Nisan, N.2
Wigderson, A.3
-
11
-
-
33749559476
-
On the power of the randomized iterate
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Haitner, I., Harnik, D., Reingold, O.: On the power of the randomized iterate. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 22-40. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 22-40
-
-
Haitner, I.1
Harnik, D.2
Reingold, O.3
-
12
-
-
40249103085
-
-
Halevi, S., Rabin, T.: Degradation and amplification of computational hardness. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 626-643. Springer, Heidelberg (2008)
-
Halevi, S., Rabin, T.: Degradation and amplification of computational hardness. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 626-643. Springer, Heidelberg (2008)
-
-
-
-
13
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM Journal on Computing 28(4), 1364-1396 (1999)
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
14
-
-
24144475180
-
-
Herzberg, A.: On tolerant cryptographic constructions. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, 3376, pp. 172-190. Springer, Heidelberg (2005)
-
Herzberg, A.: On tolerant cryptographic constructions. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 172-190. Springer, Heidelberg (2005)
-
-
-
-
15
-
-
34848917325
-
Key agreement from weak bit agreement
-
Holenstein, T.: Key agreement from weak bit agreement. In: STOC 2005, pp. 664-673 (2005)
-
(2005)
STOC 2005
, pp. 664-673
-
-
Holenstein, T.1
-
16
-
-
33745169714
-
One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Holenstein, T., Renner, R.: One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 478-493. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 478-493
-
-
Holenstein, T.1
Renner, R.2
-
17
-
-
38049059190
-
-
Hopper, N., Molnar, D., Wagner, D.: From weak to strong watermarking. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 362-382. Springer, Heidelberg (2007)
-
Hopper, N., Molnar, D., Wagner, D.: From weak to strong watermarking. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 362-382. Springer, Heidelberg (2007)
-
-
-
-
18
-
-
0029516814
-
Hard-core distributions for somewhat hard problems
-
Impagliazzo, R.: Hard-core distributions for somewhat hard problems. In: FOCS 1995, pp. 538-545 (1995)
-
(1995)
FOCS 1995
, pp. 538-545
-
-
Impagliazzo, R.1
-
19
-
-
38049125094
-
Chernoff-type direct product theorems
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Impagliazzo, R., Jaiswal, R., Kabanets, V.: Chernoff-type direct product theorems. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 500-516. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 500-516
-
-
Impagliazzo, R.1
Jaiswal, R.2
Kabanets, V.3
-
20
-
-
51249173191
-
One way functions and pseudorandom generators
-
Levin, L.A.: One way functions and pseudorandom generators. Combinatorica 7(4), 357-363 (1987)
-
(1987)
Combinatorica
, vol.7
, Issue.4
, pp. 357-363
-
-
Levin, L.A.1
-
21
-
-
5844291762
-
Pseudo-random permutation generators and cryptographic composition
-
Luby, M., Rackoff, C.: Pseudo-random permutation generators and cryptographic composition. In: STOC 1986, pp. 356-363 (1986)
-
(1986)
STOC 1986
, pp. 356-363
-
-
Luby, M.1
Rackoff, C.2
-
22
-
-
84947240143
-
Indistinguishability of random systems
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Maurer, U.: Indistinguishability of random systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 110-132. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 110-132
-
-
Maurer, U.1
-
23
-
-
0027308007
-
Cascade ciphers: The importance of being first
-
Maurer, U., Massey, J.L.: Cascade ciphers: The importance of being first. Journal of Cryptology 6(1), 55-61 (1993)
-
(1993)
Journal of Cryptology
, vol.6
, Issue.1
, pp. 55-61
-
-
Maurer, U.1
Massey, J.L.2
-
24
-
-
38049173959
-
Indistinguishability amplification
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Maurer, U., Pietrzak, K., Renner, R.: Indistinguishability amplification. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 130-149. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 130-149
-
-
Maurer, U.1
Pietrzak, K.2
Renner, R.3
-
25
-
-
38049177352
-
A fast and key-efficient reduction of chosen-ciphertext to known-plaintext security
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Maurer, U., Sjödin, J.: A fast and key-efficient reduction of chosen-ciphertext to known-plaintext security. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 498-516. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 498-516
-
-
Maurer, U.1
Sjödin, J.2
-
26
-
-
70350256331
-
-
Myers, S.: On the development of block-ciphers and pseudo-random function generators using the composition and XOR operators. Master's thesis, University of Toronto (1999)
-
Myers, S.: On the development of block-ciphers and pseudo-random function generators using the composition and XOR operators. Master's thesis, University of Toronto (1999)
-
-
-
-
27
-
-
23944518373
-
Efficient amplification of the security of weak pseudo-random function generators
-
Myers, S.: Efficient amplification of the security of weak pseudo-random function generators. Journal of Cryptology 16, 1-24 (2003)
-
(2003)
Journal of Cryptology
, vol.16
, pp. 1-24
-
-
Myers, S.1
-
28
-
-
0032647187
-
Synthesizers and their application to the parallel construction of pseudo-random functions
-
Naor, M., Reingold, O.: Synthesizers and their application to the parallel construction of pseudo-random functions. Journal of Computer and System Sciences 58(2), 336-375 (1999)
-
(1999)
Journal of Computer and System Sciences
, vol.58
, Issue.2
, pp. 336-375
-
-
Naor, M.1
Reingold, O.2
-
29
-
-
35448969719
-
An efficient parallel repetition theorem for Arthur-Merlin games
-
Pass, R., Venkitasubramaniam, M.: An efficient parallel repetition theorem for Arthur-Merlin games. In: STOC 2007, pp. 420-429 (2007)
-
(2007)
STOC 2007
, pp. 420-429
-
-
Pass, R.1
Venkitasubramaniam, M.2
-
30
-
-
38049052188
-
-
Pietrzak, K., Wikström, D.: Parallel repetition of computationally sound protocols revisited. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 86-102. Springer, Heidelberg (2007)
-
Pietrzak, K., Wikström, D.: Parallel repetition of computationally sound protocols revisited. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 86-102. Springer, Heidelberg (2007)
-
-
-
-
31
-
-
51849110592
-
Hardness amplification proofs require majority
-
Shaltiel, R., Viola, E.: Hardness amplification proofs require majority. In: STOC 2008, pp. 589-598 (2008)
-
(2008)
STOC 2008
, pp. 589-598
-
-
Shaltiel, R.1
Viola, E.2
-
32
-
-
78649840429
-
Provable security for block ciphersby decorrelation
-
Meinel, C, Morvan, M, eds, STACS 1998, Springer, Heidelberg
-
Vaudenay, S.: Provable security for block ciphersby decorrelation. In: Meinel, C., Morvan, M. (eds.) STACS 1998. LNCS, vol. 1373, pp. 249-275. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1373
, pp. 249-275
-
-
Vaudenay, S.1
-
33
-
-
84944039266
-
-
Vaudenay, S.: Adaptive-attack norm for decorrelation and super-pseudorandomness. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, 1758, pp. 49-61. Springer, Heidelberg (2000)
-
Vaudenay, S.: Adaptive-attack norm for decorrelation and super-pseudorandomness. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 49-61. Springer, Heidelberg (2000)
-
-
-
-
34
-
-
38049160265
-
Oblivious-transfer amplification
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Wullschleger, J.: Oblivious-transfer amplification. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 555-572. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 555-572
-
-
Wullschleger, J.1
-
35
-
-
0020301290
-
Theory and applications of trapdoor functions
-
Yao, A.C.: Theory and applications of trapdoor functions. In: FOCS 1982, pp. 80-91 (1982)
-
(1982)
FOCS 1982
, pp. 80-91
-
-
Yao, A.C.1
|