-
1
-
-
70350342511
-
Fast cryptographic primitives and circular-secure encryption based on hard learning problems
-
ACPS09, Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
-
[ACPS09] Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 595-618
-
-
Applebaum, B.1
Cash, D.2
Peikert, C.3
Sahai, A.4
-
3
-
-
70350627587
-
-
[AGV09] Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 474-495. Springer, Heidelberg (2009)
-
[AGV09] Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
-
-
-
-
4
-
-
70349358874
-
-
[Ale03] Alekhnovich, M.: More on average case vs approximation complexity. In: FOCS (2003)
-
[Ale03] Alekhnovich, M.: More on average case vs approximation complexity. In: FOCS (2003)
-
-
-
-
5
-
-
85030121757
-
Equivalence between two flavours of oblivious transfers
-
Cré87, Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
-
[Cré87] Crépeau, C.: Equivalence between two flavours of oblivious transfers. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 350-354. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 350-354
-
-
Crépeau, C.1
-
6
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
DORS08
-
[DORS08] Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Computing 38(1) (2008)
-
(2008)
SIAM J. Computing
, vol.38
, Issue.1
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
7
-
-
77949577551
-
-
[EGL82] Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: CRYPTO (1982)
-
[EGL82] Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: CRYPTO (1982)
-
-
-
-
8
-
-
0022080529
-
A randomized protocol for signing contracts
-
EGL85
-
[EGL85] Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Communications of the ACM 28(6) (1985)
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
9
-
-
24144500621
-
Solving medium-density subset sum problems in expected polynomial time
-
FP05, Diekert, V, Durand, B, eds, STACS 2005, Springer, Heidelberg
-
[FP05] Flaxman, A., Przydatek, B.: Solving medium-density subset sum problems in expected polynomial time. In: Diekert, V., Durand, B. (eds.) STACS 2005. LNCS, vol. 3404, pp. 305-314. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3404
, pp. 305-314
-
-
Flaxman, A.1
Przydatek, B.2
-
10
-
-
0008203229
-
On the Lagarias-Odlyzko algorithm for the subset sum problem
-
Fri86
-
[Fri86] Frieze, A.: On the Lagarias-Odlyzko algorithm for the subset sum problem. SIAM Journal on Computing 15 (1986)
-
(1986)
SIAM Journal on Computing
, vol.15
-
-
Frieze, A.1
-
11
-
-
0034497243
-
-
[GKM+00] Gertner, Y., Kannan, S., Malkin, T., Reingold, O., Viswanathan, M.: The relationship between public key encryption and oblivious transfer. In: FOCS (2000)
-
[GKM+00] Gertner, Y., Kannan, S., Malkin, T., Reingold, O., Viswanathan, M.: The relationship between public key encryption and oblivious transfer. In: FOCS (2000)
-
-
-
-
12
-
-
77949603116
-
-
[GMW87] Goldreich,O.,Micali, S.,Wigderson,A.:Howto play a mental game - a completeness theorem for protocols with honest majority. In: STOC (1987)
-
[GMW87] Goldreich,O.,Micali, S.,Wigderson,A.:Howto play a mental game - a completeness theorem for protocols with honest majority. In: STOC (1987)
-
-
-
-
13
-
-
0003691180
-
Foundations of Cryptography
-
Gol04, Basic Applications, Cambridge University Press, Cambridge 2004
-
[Gol04] Goldreich, O.: Foundations of Cryptography - Volume 2 (Basic Applications). Cambridge University Press, Cambridge (2004)
-
, vol.2
-
-
Goldreich, O.1
-
14
-
-
51849137205
-
-
GPV08, STOC 2008
-
[GPV08] Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices, and new cryptographic constructions. In: STOC (2008)
-
Trapdoors for hard lattices, and new cryptographic constructions
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
15
-
-
40249094510
-
-
[Hai08] Haitner, I.: Semi-honest to malicious oblivious transfer - The black-box way. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 412-426. Springer, Heidelberg (2008)
-
[Hai08] Haitner, I.: Semi-honest to malicious oblivious transfer - The black-box way. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 412-426. Springer, Heidelberg (2008)
-
-
-
-
16
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
Hoe63
-
[Hoe63] Hoeffding, W.: Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association 58(301) (1963)
-
(1963)
Journal of the American Statistical Association
, vol.58
, Issue.301
-
-
Hoeffding, W.1
-
17
-
-
85077701725
-
-
[HSH+08] Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: Cold boot attacks on encryption keys. In: USENIX Security (2008)
-
[HSH+08] Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: Cold boot attacks on encryption keys. In: USENIX Security (2008)
-
-
-
-
18
-
-
0001143795
-
Efficient cryptographic schemes provably as secure as subset sum
-
IN96
-
[IN96] Impagliazzo, R., Naor, M.: Efficient cryptographic schemes provably as secure as subset sum. Journal of Cryptology 9(4) (1996)
-
(1996)
Journal of Cryptology
, vol.9
, Issue.4
-
-
Impagliazzo, R.1
Naor, M.2
-
20
-
-
70350336456
-
On bounded distance decoding, unique shortest vectors, and the minimum distance problem
-
LM09, Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
-
[LM09] Lyubashevsky, V., Micciancio, D.: On bounded distance decoding, unique shortest vectors, and the minimum distance problem. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 577-594. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 577-594
-
-
Lyubashevsky, V.1
Micciancio, D.2
-
23
-
-
26944487960
-
-
[Lyu05] Lyubashevsky, V.: The parity problem in the presence of noise, decoding random linear codes, and the subset sum problem. In: Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.) APPROX 2005 and RANDOM2005. LNCS, 3624, pp. 378-389. Springer, Heidelberg (2005)
-
[Lyu05] Lyubashevsky, V.: The parity problem in the presence of noise, decoding random linear codes, and the subset sum problem. In: Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.) APPROX 2005 and RANDOM2005. LNCS, vol. 3624, pp. 378-389. Springer, Heidelberg (2005)
-
-
-
-
24
-
-
0018019325
-
Hiding information and signatures in trapdoor knapsacks
-
MH78
-
[MH78] Merkle, R.C., Hellman, M.E.: Hiding information and signatures in trapdoor knapsacks. IEEE Trans. on Inf. Theory IT-24 (1978)
-
(1978)
IEEE Trans. on Inf. Theory
, vol.IT-24
-
-
Merkle, R.C.1
Hellman, M.E.2
-
25
-
-
70350303869
-
Public-key cryptosystems resilient to key leakage
-
NS09, Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
-
[NS09] Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 18-35
-
-
Naor, M.1
Segev, G.2
-
26
-
-
0002114928
-
The rise and fall of knapsack cryptosystems
-
Odl90
-
[Odl90] Odlyzko, A.: The rise and fall of knapsack cryptosystems. In: Symposia of Applied Mathematics (1990)
-
(1990)
Symposia of Applied Mathematics
-
-
Odlyzko, A.1
-
28
-
-
51849126892
-
A framework for efficient and composable oblivious transfer
-
PVW08, Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
[PVW08] Peikert, C., Vaikuntanathan, V., Waters, B.: A framework for efficient and composable oblivious transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
-
30
-
-
0003462641
-
How to exchange secret keys by oblivious transfer
-
Rab81, Technical Report TR-81. Harvard Aiken Computation Laboratory
-
[Rab81] Rabin, M.O.: How to exchange secret keys by oblivious transfer. In: Technical Report TR-81. Harvard Aiken Computation Laboratory (1981)
-
(1981)
-
-
Rabin, M.O.1
-
33
-
-
44649115943
-
-
[Sha08] Shallue, A.: An improved multi-set algorithm for the dense subset sum problem. In: van der Poorten, A.J., Stein, A. (eds.) ANTS-VIII 2008. LNCS, 5011, pp. 416-429. Springer, Heidelberg (2008)
-
[Sha08] Shallue, A.: An improved multi-set algorithm for the dense subset sum problem. In: van der Poorten, A.J., Stein, A. (eds.) ANTS-VIII 2008. LNCS, vol. 5011, pp. 416-429. Springer, Heidelberg (2008)
-
-
-
-
34
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Sho97
-
[Sho97] Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5) (1997)
-
(1997)
SIAM J. Comput
, vol.26
, Issue.5
-
-
Shor, P.1
-
35
-
-
0022882770
-
-
[Yao86] Yao, A.C.: How to generate and exchange secrets. In: FOCS (1986)
-
[Yao86] Yao, A.C.: How to generate and exchange secrets. In: FOCS (1986)
-
-
-
|