-
1
-
-
26844436507
-
NP-complete problems and physical reality
-
S. AARONSON, NP-complete problems and physical reality, SIGACT News, 36 (2005), pp. 30-52.
-
(2005)
SIGACT News
, vol.36
, pp. 30-52
-
-
Aaronson, S.1
-
2
-
-
84976775257
-
Color-coding
-
N. ALON, R. YUSTER, AND U. ZwiCK, Color-coding, J. ACM, 42 (1995), pp. 844-856.
-
(1995)
J. ACM
, vol.42
, pp. 844-856
-
-
Alon, N.1
Yuster, R.2
Zwick, U.3
-
3
-
-
0036612020
-
Everlasting security in the bounded storage model
-
Y. Aumann, Y.Z. Ding, and M.O. Rabin, Everlasting security in the bounded storage model, IEEE Trans. Inform. Theory, 48 (2002), pp. 1668-1680.
-
(2002)
IEEE Trans. Inform. Theory
, vol.48
, pp. 1668-1680
-
-
Aumann, Y.1
Ding, Y.Z.2
Rabin, M.O.3
-
4
-
-
84957084138
-
Information theoretically secure communication in the limited storage space model
-
Springer, New York
-
Y. AUMANN AND M.O. Rabin, Information theoretically secure communication in the limited storage space model, in Advances in Cryptology-CRYPTO '99, Lecture Notes in Comput. Sci. 1666, Springer, New York, 1999, pp. 65-79.
-
(1999)
Advances in Cryptology-CRYPTO '99, Lecture Notes in Comput. Sci.
, vol.1666
, pp. 65-79
-
-
Aumann, Y.1
Rabin, M.O.2
-
6
-
-
35048832490
-
An uninsta ntiable random-oracle-model scheme for a hybrid-encryption problem
-
Springer, New York
-
M. BELLARE, A. BOLDyREvA, AND A. PALACIO, An uninsta ntiable random-oracle-model scheme for a hybrid-encryption problem, in Advances in Cryptology - EUROCRYPT '2004, Lecture Notes in Comput. Sci. 3027, 2004, Springer, New York, pp. 171-188.
-
(2004)
Advances in Cryptology - EUROCRYPT '2004, Lecture Notes in Comput. Sci.
, vol.3027
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
7
-
-
0026853668
-
On the theory of average case complexity
-
S. Ben-David, B. Chor, O. Goldreich, AND M. Luby, On the theory of average case complexity, J. Comput. System Sci., 44 (1992), pp. 193-219.
-
(1992)
J. Comput. System Sci.
, vol.44
, pp. 193-219
-
-
Ben-David, S.1
Chor, B.2
Goldreich, O.3
Luby, M.4
-
8
-
-
32144442416
-
Simplifying the weft hierarchy
-
J. Buss AND T. Islam, Simplifying the weft hierarchy, Theoret. Comput. Sci., 351 (2006), pp. 303-313.
-
(2006)
Theoret. Comput. Sci.
, vol.351
, pp. 303-313
-
-
Buss, J.1
Islam, T.2
-
9
-
-
84958598231
-
Unconditional security against memory-bound adversaries
-
Springer, New York
-
C. Cachin AND U. MAURER, Unconditional security against memory-bound adversaries, in Advances in Cryptology - CRYPTO '97, Lecture Notes in Comput. Sci. 1294, Springer, New York, 1997, pp. 292-306.
-
(1997)
Advances in Cryptology - CRYPTO '97, Lecture Notes in Comput. Sci.
, vol.1294
, pp. 292-306
-
-
Cachin, C.1
Maurer, U.2
-
10
-
-
0000491637
-
On the amount of nondeterminism and the power of verifying
-
L. Cai AND J. Chen, On the amount of nondeterminism and the power of verifying, SIAM J. Comput., 26 (1997), pp. 733-750.
-
(1997)
SIAM J. Comput.
, vol.26
, pp. 733-750
-
-
Cai, L.1
Chen, J.2
-
11
-
-
4243180376
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, AND S. HALEVI, The random oracle methodology, revisited, J. ACM, 51 (2004), pp. 557-594.
-
(2004)
J. ACM
, vol.51
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
12
-
-
24144439137
-
Tight lower bounds for certain parameterized NP-hard problems
-
J. Chen, B. Chor, M. Fellows, X. Huang, D. Juedes, I. Kanj, and G. Xia, Tight lower bounds for certain parameterized NP-hard problems, Inform. and Comput., 201 (2005), pp. 216-231.
-
(2005)
Inform. and Comput.
, vol.201
, pp. 216-231
-
-
Chen, J.1
Chor, B.2
Fellows, M.3
Huang, X.4
Juedes, D.5
Kanj, I.6
Xia, G.7
-
13
-
-
0013072266
-
Vertex cover: Further observations and further improvements
-
J. Chen, I. Kanj, AND W. JIA, Vertex cover: Further observations and further improvements, J. Algorithms, 41 (2001), pp. 280-301.
-
(2001)
J. Algorithms
, vol.41
, pp. 280-301
-
-
Chen, J.1
Kanj, I.2
Jia, W.3
-
15
-
-
35048876678
-
2) steps
-
Springer-Verlag, New York
-
2) steps, in WG 04, Lecture Notes in Comput. Sci. 3353, Springer-Verlag, New York, 2004, pp. 257-269.
-
(2004)
WG 04, Lecture Notes in Comput. Sci.
, vol.3353
, pp. 257-269
-
-
Chor, B.1
Fellows, M.2
Juedes, D.3
-
17
-
-
84981199109
-
A design principle for hash functions
-
Springer, New York
-
I. Damgård, A design principle for hash functions, in Advances in Cryptology - CRYPTO '89, Lecture Notes in Comput. Sci. 435, Springer, New York, 1989, pp. 416-427.
-
(1989)
Advances in Cryptology - CRYPTO '89, Lecture Notes in Comput. Sci.
, vol.435
, pp. 416-427
-
-
Damgård, I.1
-
18
-
-
85016692748
-
On the existence of statistically hiding bit commitment schemes and fail-stop signatures
-
Springer, New York
-
I. Damgård, T. PEDERSEN, AND B. PFITZMANN, On the existence of statistically hiding bit commitment schemes and fail-stop signatures, in Advances in Cryptology - CRYPTO '93, Lecture Notes in Comput. Sci. 773, Springer, New York, 1993, pp. 250-265.
-
(1993)
Advances in Cryptology - CRYPTO '93, Lecture Notes in Comput. Sci.
, vol.773
, pp. 250-265
-
-
Damgård, I.1
Pedersen, T.2
Pfitzmann, B.3
-
20
-
-
80051636706
-
Single database private information retrieval implies oblivious transfer
-
Springer, New York
-
G. DI CRESCENZO, T. MALKIN, AND R. OSTROVSKY, Single database private information retrieval implies oblivious transfer, in Advances in Cryptology - EUROCRYPT '2000, Lecture Notes in Comput. Sci. 1807, Springer, New York, 2000, pp. 122-138.
-
(2000)
Advances in Cryptology - EUROCRYPT '2000, Lecture Notes in Comput. Sci.
, vol.1807
, pp. 122-138
-
-
Di Crescenzo, G.1
Malkin, T.2
Ostrovsky, R.3
-
22
-
-
84937431717
-
Hyper-encryption and everlasting security
-
Springer, New York
-
Y.Z. DING AND M.O. RABIN, Hyper-encryption and everlasting security, in Annual Symposium on Theoretical Aspects ofComputer Science (STACS), Lecture Notes in Comput. Sci. 2285, Springer, New York, 2002, pp. 1-26.
-
(2002)
Annual Symposium on Theoretical Aspects OfComputer Science (STACS), Lecture Notes in Comput. Sci.
, vol.2285
, pp. 1-26
-
-
Ding, Y.Z.1
Rabin, M.O.2
-
23
-
-
34250354807
-
The PCP theorem by gap amplification
-
article 12
-
I. Dinur, The PCP theorem by gap amplification, J. ACM, 54 (2007), article 12.
-
(2007)
J. ACM
, vol.54
-
-
Dinur, I.1
-
25
-
-
0038542579
-
Parameterized complexity: A systematic method for confronting computational intractability
-
AMS, Providence, RI
-
R. Downey, M. Fellows, AND U. Stege, Parameterized complexity: A systematic method for confronting computational intractability, in Conte mporary Trends in Discrete Mathematics, AMS DIMACS Proc. Ser. 49, AMS, Providence, RI, 1999, pp. 49-100.
-
(1999)
Conte Mporary Trends in Discrete Mathematics, AMS DIMACS Proc. Ser.
, vol.49
, pp. 49-100
-
-
Downey, R.1
Fellows, M.2
Stege, U.3
-
27
-
-
0029720071
-
Digital signets: Self-enforcing protection of digital information
-
C. Dwork, J. Lotspiech, AND M. Naor, Digital signets: Self-enforcing protection of digital information, in Proceedings of the 28th ACM Symposium on the Theory of Computing, 1996, pp. 489-498.
-
(1996)
Proceedings of the 28th ACM Symposium on the Theory of Computing
, pp. 489-498
-
-
Dwork, C.1
Lotspiech, J.2
Naor, M.3
-
28
-
-
33749583877
-
On forward-secure storage
-
Springer, New York
-
S. Dziembowski, On forward-secure storage, in Advances in Cryptology - CRYPTO '06, Lecture Notes in Comput. Sci. 4117, Springer, New York, 2006, pp. 251-270.
-
(2006)
Advances in Cryptology - CRYPTO '06, Lecture Notes in Comput. Sci.
, vol.4117
, pp. 251-270
-
-
Dziembowski, S.1
-
29
-
-
35048832981
-
On generating the initial key in the bounded-storage model
-
New York
-
S. Dziembowski AND U. Maurer, On generating the initial key in the bounded-storage model, in Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Comput. Sci. 3027, Springer, New York, 2004, pp. 126-137.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Comput. Sci.
, vol.3027
, pp. 126-137
-
-
Dziembowski, S.1
Maurer, U.2
-
30
-
-
4344699394
-
Optimal randomizer efficiency in the bounded-storage model
-
S. Dziembowski AND U. Maurer, Optimal randomizer efficiency in the bounded-storage model, J. Cryptology, 17 (2004), pp. 5-26.
-
(2004)
J. Cryptology
, vol.17
, pp. 5-26
-
-
Dziembowski, S.1
Maurer, U.2
-
32
-
-
0010528929
-
On limited versus polynomial nondeterminism
-
U. FEIGE AND J. KILIAN, On limited versus polynomial nondeterminism, Chicago J. Theoret. Comput. Sci., 1997 (1997), pp. 1-20.
-
(1997)
Chicago J. Theoret. Comput. Sci.
, vol.1997
, pp. 1-20
-
-
Feige, U.1
Kilian, J.2
-
33
-
-
84944900656
-
On the impossibility of constructing non-interactive statistically-secret protocols from any trapdoor one-way function
-
M. FISCHLIN, On the impossibility of constructing non-interactive statistically-secret protocols from any trapdoor one-way function, in Topics in Cr yptology-CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, pp. 79-95.
-
(2002)
Topics in Cr Yptology-CT-RSA 2002, the Cryptographer's Track at the RSA Conference
, pp. 79-95
-
-
Fischlin, M.1
-
35
-
-
33646522733
-
2 n nonde-terministic bits
-
Springer, New York
-
2 n nonde-terministic bits, in Proceedings of the 31st Internatio nal Colloquium on Automata, Languages and Programming (ICALP) 2004, Lecture Notes in Comput. Sci. 3142, Springer, New York, 2004, pp. 555-567.
-
(2004)
Proceedings of the 31st Internatio Nal Colloquium on Automata, Languages and Programming (ICALP) 2004, Lecture Notes in Comput. Sci.
, vol.3142
, pp. 555-567
-
-
Flum, J.1
Grohe, M.2
Weyer, M.3
-
36
-
-
57049128326
-
Infeasibility of instance compression and succinct PCPs for NP
-
New York
-
L. FORTNOW AND R. SANTHANAM, Infeasibility of instance compression and succinct PCPs for NP, in Proceedings of the 40th ACM Symposium on the Theory of Computing, ACM, New York, 2008, pp. 133-142.
-
(2008)
Proceedings of the 40th ACM Symposium on the Theory of Computing, ACM
, pp. 133-142
-
-
Fortnow, L.1
Santhanam, R.2
-
39
-
-
71149116146
-
Proofs that yield nothing but their validity, or all languages in NP have zero-knowledge proof systems
-
O. GoLDREICH, S. Micali, AND A. Wigderson, Proofs that yield nothing but their validity, or all languages in NP have zero-knowledge proof systems, J. ACM, 38 (1991), pp. 691-729.
-
(1991)
J. ACM
, vol.38
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
40
-
-
0002515163
-
Limited nondeterminism
-
J. Goldsmith, M. Levy, AND M. MUNDHENK, Limited nondeterminism, SIGACT News, 27 (1996), pp. 20-29.
-
(1996)
SIGACT News
, vol.27
, pp. 20-29
-
-
Goldsmith, J.1
Levy, M.2
Mundhenk, M.3
-
42
-
-
40249112675
-
Finding collisions in interactive protocols - A tight lower bound on the round complexity of statistically-hiding commitments
-
I. HAITNER, J. HOCH, O. Reingold, AND G. Segev, Finding collisions in interactive protocols - a tight lower bound on the round complexity of statistically-hiding commitments, in Proceedings of the 48th IEEE Symposium on Foundations of Computer Science, 2007, pp. 669-679.
-
(2007)
Proceedings of the 48th IEEE Symposium on Foundations of Computer Science
, pp. 669-679
-
-
Haitner, I.1
Hoch, J.2
Reingold, O.3
Segev, G.4
-
43
-
-
24944462872
-
Reducing complexity assumptions for statistically-hiding commitment
-
Springer, New York
-
I. HAITNER, O. HoRVITZ, J. Katz, C. Koo, R. MoRSELLI, AND R. SHALTIEL, Reducing complexity assumptions for statistically-hiding commitment, in Advances in Cryptology - EURO-CRYPT '2005, Lecture Notes in Comput. Sci. 3494, Springer, New York, 2005, pp. 58-77.
-
(2005)
Advances in Cryptology - EURO-CRYPT '2005, Lecture Notes in Comput. Sci.
, vol.3494
, pp. 58-77
-
-
Haitner, I.1
Horvitz, O.2
Katz, J.3
Koo, C.4
Morselli, R.5
Shaltiel, R.6
-
45
-
-
33746364208
-
On everlasting security in the hybrid bounded storage model
-
Springer, New York
-
D. HARNIK AND M. Naor, On everlasting security in the hybrid bounded storage model, in Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP) 2006, Part II, Lecture Notes in Comput. Sci. 4052, Springer, New York, 2006, pp. 192-203.
-
(2006)
Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP) 2006, Part II, Lecture Notes in Comput. Sci.
, vol.4052
, pp. 192-203
-
-
Harnik, D.1
Naor, M.2
-
47
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. HAsTAD, R. IMPAGLIAZZO, L.A. Levin, AND M. Luby, A pseudorandom generator from any one-way function, SIAM J. Comput., 29 (1999), pp. 1364-1396.
-
(1999)
SIAM J. Comput.
, vol.29
, pp. 1364-1396
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
48
-
-
33745848493
-
Finding collisions on a public road, or do secure hash functions need secret coins?
-
Springer, New York
-
C. HSIAO AND L. REYZIN, Finding collisions on a public road, or do secure hash functions need secret coins?, in Advances in Cryptology - CRYPTO '04, Lecture in Notes Comput. Sci. 3152, Springer, New York, 2004, pp. 92-105.
-
(2004)
Advances in Cryptology - CRYPTO '04, Lecture in Notes Comput. Sci.
, vol.3152
, pp. 92-105
-
-
Hsiao, C.1
Reyzin, L.2
-
51
-
-
0032308058
-
Which problems have strongly exponential complexity?
-
R. IMPAGLIAZZO, R. PATURI, AND F. Zane, Which problems have strongly exponential complexity?, in Proceedings of the 39th IEEE Symposium on Foundations of Computer Science, 1998, pp. 653-663.
-
(1998)
Proceedings of the 39th IEEE Symposium on Foundations of Computer Science
, pp. 653-663
-
-
Impagliazzo, R.1
Paturi, R.2
Zane, F.3
-
53
-
-
24144497043
-
Sufficient conditions for collision-resistant hashing
-
Springer, New York
-
Y. Ishai, E. KusHiLEViTZ, AND R. Ostrovsky, Sufficient conditions for collision-resistant hashing, in 2nd Theory of Cryptography Conference (TCC '05), Lecture Notes in Comput. Sci. 3378, Springer, New York, 2005, pp. 445-456.
-
(2005)
2nd Theory of Cryptography Conference (TCC '05), Lecture Notes in Comput. Sci.
, vol.3378
, pp. 445-456
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
-
54
-
-
0032606871
-
Tractability of parameterized completion problems on chordal, strongly chordal, and proper interval graphs
-
H. KAPLAN, R. Shamir, AND R. Tarjan, Tractability of parameterized completion problems on chordal, strongly chordal, and proper interval graphs, SIAM J. Comput., 28 (1999), pp. 1906-1922.
-
(1999)
SIAM J. Comput.
, vol.28
, pp. 1906-1922
-
-
Kaplan, H.1
Shamir, R.2
Tarjan, R.3
-
55
-
-
0003037529
-
Reducibility among combinatorial problems
-
R. Miller and J. Thatcher, eds., Plenum Press, New York
-
R. KARP, Reducibility among combinatorial problems, in Complexity of Computer Computations, R. Miller and J. Thatcher, eds., Plenum Press, New York, 1972, pp. 85-103.
-
(1972)
Complexity of Computer Computations
, pp. 85-103
-
-
Karp, R.1
-
56
-
-
0022030599
-
Efficient randomized pattern-matching algorithms
-
R. KARP AND M. Rabin, Efficient randomized pattern-matching algorithms, IBM J. Res. Dev., 31 (1987), pp. 249-260.
-
(1987)
IBM J. Res. Dev.
, vol.31
, pp. 249-260
-
-
Karp, R.1
Rabin, M.2
-
58
-
-
0002716212
-
Refining nondeterminism in relativized polynomial-time bounded computations
-
C. KiNTALA AND P. Fischer, Refining nondeterminism in relativized polynomial-time bounded computations, SIAM J. Comput., 9 (1980), pp. 46-53.
-
(1980)
SIAM J. Comput.
, vol.9
, pp. 46-53
-
-
Kintala, C.1
Fischer, P.2
-
61
-
-
4344636292
-
Encryption against space-bounded adversaries from on-line strong extractors
-
C. Lu, Encryption against space-bounded adversaries from on-line strong extractors, J.Cryptology, 17 (2004), pp. 27-42.
-
(2004)
J.Cryptology
, vol.17
, pp. 27-42
-
-
Lu, C.1
-
62
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
U. MAURER, Conditionally-perfect secrecy and a provably-secure randomized cipher, J. Cryptology, 5 (1992), pp. 53-66.
-
(1992)
J. Cryptology
, vol.5
, pp. 53-66
-
-
Maurer, U.1
-
63
-
-
0027599802
-
Secret key agreement by public discussion
-
U. MAURER, Secret key agreement by public discussion, IEEE Trans. Inform. Theory, 39 (1993), pp. 733-742.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.1
-
64
-
-
35048817517
-
Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology
-
Springer, New York
-
U. MAURER, R. Renner, AND C. Holenstein, Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology, in Proceedings of the 1st Theory of Cryptography Conference (TCC '04), Lecture Notes in Comput. Sci. 2951, Springer, New York, 2004, pp. 21-39.
-
(2004)
Proceedings of the 1st Theory of Cryptography Conference (TCC '04), Lecture Notes in Comput. Sci.
, vol.2951
, pp. 21-39
-
-
Maurer, U.1
Renner, R.2
Holenstein, C.3
-
66
-
-
0027641832
-
Small-bias probability spaces: Efficient constructions and applications
-
J. NAOR AND M. Naor, Small-bias probability spaces: Efficient constructions and applications, SIAM J. Comput., 22 (1993), pp. 838-856.
-
(1993)
SIAM J. Comput.
, vol.22
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
67
-
-
0001448484
-
Bit commitment using pseudorandomness
-
M. NAOR, Bit commitment using pseudorandomness, J. Cryptology, 4 (1991), pp. 151-158.
-
(1991)
J. Cryptology
, vol.4
, pp. 151-158
-
-
Naor, M.1
-
68
-
-
35248818856
-
On cryptographic assumptions and challenges
-
Springer, New York
-
M. NAOR, On cryptographic assumptions and challenges, in Advances in Cryptology - CRYPTO '03, Lecture Notes in Comput. Sci. 2729, Springer, New York, 2003, pp. 96-109.
-
(2003)
Advances in Cryptology - CRYPTO '03, Lecture Notes in Comput. Sci.
, vol.2729
, pp. 96-109
-
-
Naor, M.1
-
69
-
-
0141544069
-
Perfect zero-knowledge arguments for NP using any one-way permutation
-
M. Naor, R. Ostrovsky, R. VENKATESAN, AND M. Yung, Perfect zero-knowledge arguments for NP using any one-way permutation, J. Cryptology, 11 (1998), pp. 87-108.
-
(1998)
J. Cryptology
, vol.11
, pp. 87-108
-
-
Naor, M.1
Ostrovsky, R.2
Venkatesan, R.3
Yung, M.4
-
71
-
-
38149096534
-
Statistical zero-knowledge arguments for NP from any one-way function
-
M. Nguyen, S. Ong, AND S. VADHAN, Statistical zero-knowledge arguments for NP from any one-way function, in Proceedings of the 47th IEEE Symposium on Foundations of Computer Science, 2006, pp. 3-14.
-
(2006)
Proceedings of the 47th IEEE Symposium on Foundations of Computer Science
, pp. 3-14
-
-
Nguyen, M.1
Ong, S.2
Vadhan, S.3
-
73
-
-
84937420653
-
Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
-
Springer, New York
-
J.B. NIELSEN, Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case, in Advances in Cryptology - CRYPTO '02, Lecture Notes in Comput. Sci. 2442, Springer, New York, 2002, pp. 111-126.
-
(2002)
Advances in Cryptology - CRYPTO '02, Lecture Notes in Comput. Sci.
, vol.2442
, pp. 111-126
-
-
Nielsen, J.B.1
-
74
-
-
33645600801
-
On protocol security in the cryptographic model
-
University of Aarhus, Denmark
-
J.B. NIELSEN, On protocol security in the cryptographic model, BRICS Diss. Ser. DS-03-8, University of Aarhus, Denmark, 2003.
-
(2003)
BRICS Diss. Ser. DS-03-8
-
-
Nielsen, J.B.1
-
75
-
-
84898928682
-
Optimization, approximation, and complexity classes
-
C. PAPADIMITRiou AND M. YANNAKAKIS, Optimization, approximation, and complexity classes, in Proceedings of the 20th ACM Symposium on the Theory of Computing, 1988, pp. 229-234.
-
(1988)
Proceedings of the 20th ACM Symposium on the Theory of Computing
, pp. 229-234
-
-
Papadimitriou, C.1
Yannakakis, M.2
-
76
-
-
0030262302
-
On limited nondeterminism and the complexity of the V-C dimension
-
C. PAPADIMITRiou AND M. YANNAKAKIS, On limited nondeterminism and the complexity of the V-C dimension, J. Comput. System Sci., 53 (1996), pp. 161-170.
-
(1996)
J. Comput. System Sci.
, vol.53
, pp. 161-170
-
-
Papadimitriou, C.1
Yannakakis, M.2
-
77
-
-
84957690790
-
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
-
Springer, New York
-
D. Simon, Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?, in Advances in Cryptology - EUROCRYPT 1998, Lecture Notes in Comput. Sci. 1403, Springer, New York, 1998, pp. 334-345.
-
(1998)
Advances in Cryptology - EUROCRYPT 1998, Lecture Notes in Comput. Sci.
, vol.1403
, pp. 334-345
-
-
Simon, D.1
-
78
-
-
29144496911
-
Compression of samplable sources, Comput
-
L. TREVISAN, S. VADHAN, AND D. ZUCKERMAN, Compression of samplable sources, Comput. Complexity, 14 (2005), pp. 186-227.
-
(2005)
Complexity
, vol.14
, pp. 186-227
-
-
Trevisan, L.1
Vadhan, S.2
Zuckerman, D.3
-
79
-
-
4344628859
-
Constructing locally computable extractors and cryptosystems in the bounded storage model
-
S. VADHAN, Constructing locally computable extractors and cryptosystems in the bounded storage model, J. Cryptology, 17 (2004), pp. 43-77.
-
(2004)
J. Cryptology
, vol.17
, pp. 43-77
-
-
Vadhan, S.1
-
80
-
-
0022911518
-
NP is as easy as detecting unique solutions
-
L. VALIANT AND V. VAZIRANI, NP is as easy as detecting unique solutions, Theoret. Comput. Sci., 47 (1986), pp. 85-93.
-
(1986)
Theoret. Comput. Sci.
, vol.47
, pp. 85-93
-
-
Valiant, L.1
Vazirani, V.2
-
83
-
-
33745529357
-
Finding pessiland
-
Springer, New York
-
H. WEE, Finding pessiland, in Theory of Cryptography C onference (TCC '06), Lecture Notes in Comput. Sci. 3876, Springer, New York, 2006, pp. 429-442.
-
(2006)
Theory of Cryptography C Onference (TCC '06), Lecture Notes in Comput. Sci.
, vol.3876
, pp. 429-442
-
-
Wee, H.1
|