-
1
-
-
79953204743
-
-
Manuscript
-
Fredrik Almgren, Gunnar Andersson, Torbjörn Granlund, Lars Ivansson, and Staffan Ulfberg. How we cracked the code book ciphers. Manuscript, 2000. http://codebook.org/codebook-solution.pdf.
-
(2000)
How We Cracked the Code Book Ciphers
-
-
Almgren, F.1
Andersson, G.2
Granlund, T.3
Ivansson, L.4
Ulfberg, S.5
-
2
-
-
33748114891
-
On basing one-way functions on NP-hardness
-
Adi Akavia, Oded Goldreich, Shafi Goldwasser, and Dana Moshkovitz. On basing one-way functions on NP-hardness. In STOC '06, pages 701-710, 2006.
-
(2006)
STOC '06
, pp. 701-710
-
-
Akavia, A.1
Goldreich, O.2
Goldwasser, S.3
Moshkovitz, D.4
-
3
-
-
0035166072
-
How to go beyond the black-box simulation barrier
-
volume 0
-
Boaz Barak. How to go beyond the black-box simulation barrier. In FOCS '01, volume 0, pages 106-115, 2001.
-
(2001)
FOCS '01
, pp. 106-115
-
-
Barak, B.1
-
4
-
-
0035163053
-
Resettably-sound zero-knowledge and its applications
-
Boaz Barak, Oded Goldreich, Shafi Goldwasser, and Yehuda Lindell. Resettably-sound zero-knowledge and its applications. In FOCS '02, pages 116-125, 2001.
-
(2001)
FOCS '02
, pp. 116-125
-
-
Barak, B.1
Goldreich, O.2
Goldwasser, S.3
Lindell, Y.4
-
5
-
-
67650685947
-
Possibility and impossibility results for encryption and commitment secure under selective opening
-
Mihir Bellare, Dennis Hofheinz, and Scott Yilek. Possibility and impossibility results for encryption and commitment secure under selective opening. In EUROCRYPT, pages 1-35, 2009.
-
(2009)
EUROCRYPT
, pp. 1-35
-
-
Bellare, M.1
Hofheinz, D.2
Yilek, S.3
-
7
-
-
43149115190
-
Separation results on the "one-more" computational problems
-
Emmanuel Bresson, Jean Monnerat, and Damien Vergnaud. Separation results on the "one-more" computational problems. In CT-RSA, pages 71-87,2008.
-
(2008)
CT-RSA
, pp. 71-87
-
-
Bresson, E.1
Monnerat, J.2
Vergnaud, D.3
-
8
-
-
20544449100
-
The one-more-rsa-inversion problems and the security of chaum's blind signature scheme
-
Mihir Bellare, Chanathip Namprempre, David Pointcheval, and Michael Semanko. The one-more-rsa-inversion problems and the security of chaum's blind signature scheme. J. Cryptology, 16(3):185-215, 2003.
-
(2003)
J. Cryptology
, vol.16
, Issue.3
, pp. 185-215
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
9
-
-
84937408891
-
Gq and schnorr identication schemes: Proofs of security against impersonation under active and concurrent attacks
-
Mihir Bellare and Adriana Palacio. Gq and schnorr identication schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162-177, 2002.
-
(2002)
CRYPTO
, pp. 162-177
-
-
Bellare, M.1
Palacio, A.2
-
12
-
-
0344550509
-
On worst-case to average-case reductions for np problems
-
Andrej Bogdanov and Luca Trevisan. On worst-case to average-case reductions for np problems. In FOCS, pages 308-317, 2003.
-
(2003)
FOCS
, pp. 308-317
-
-
Bogdanov, A.1
Trevisan, L.2
-
13
-
-
84957634529
-
Breaking rsa may not be equivalent to factoring
-
Dan Boneh and Ramarathnam Venkatesan. Breaking rsa may not be equivalent to factoring. In EUROCRYPT, pages 59-71, 1998.
-
(1998)
EUROCRYPT
, pp. 59-71
-
-
Boneh, D.1
Venkatesan, R.2
-
14
-
-
85016672373
-
Proofs of partial knowledge and simplied design of witness hiding protocols
-
Ronald Cramer, Ivan Damgård, and Berry Schoenmakers. Proofs of partial knowledge and simplied design of witness hiding protocols. In CRYPTO, pages 174-187, 1994.
-
(1994)
CRYPTO
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
15
-
-
0033723965
-
Resettable zero-knowledge
-
extended abstract
-
Ran Canetti, Oded Goldreich, Shafi Goldwasser, and Silvio Micali. Resettable zero-knowledge (extended abstract). In STOC '00, pages 235-244, 2000.
-
(2000)
STOC '00
, pp. 235-244
-
-
Canetti, R.1
Goldreich, O.2
Goldwasser, S.3
Micali, S.4
-
16
-
-
4243180376
-
The random oracle methodology, revisited
-
Ran Canetti, Oded Goldreich, and Shai Halevi. The random oracle methodology, revisited. J. ACM, 51(4):557-594, 2004.
-
(2004)
J. ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
17
-
-
0020915882
-
Blind signatures for untraceable payments
-
David Chaum. Blind signatures for untraceable payments. In CRYPTO, pages 199-203, 1982.
-
(1982)
CRYPTO
, pp. 199-203
-
-
Chaum, D.1
-
18
-
-
78751481427
-
Adaptive hardness and composable security in the plain model from standard assumptions
-
Ran Canetti, Huijia Lin, and Rafael Pass. Adaptive hardness and composable security in the plain model from standard assumptions. In FOCS, pages 541-550, 2010.
-
(2010)
FOCS
, pp. 541-550
-
-
Canetti, R.1
Lin, H.2
Pass, R.3
-
19
-
-
77952374208
-
Resolving the simultaneous resettability conjecture and a new non-black-box simulation strategy
-
Yi Deng, Vipul Goyal, and Amit Sahai. Resolving the simultaneous resettability conjecture and a new non-black-box simulation strategy. In FOCS, pages 251-260, 2009.
-
(2009)
FOCS
, pp. 251-260
-
-
Deng, Y.1
Goyal, V.2
Sahai, A.3
-
20
-
-
4243148483
-
Magic functions
-
Cynthia Dwork, Moni Naor, Omer Reingold, and Larry J. Stockmeyer. Magic functions. J. ACM, 50(6):852-921, 2003.
-
(2003)
J. ACM
, vol.50
, Issue.6
, pp. 852-921
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Stockmeyer, L.J.4
-
21
-
-
20444446289
-
Concurrent zero-knowledge
-
Cynthia Dwork, Moni Naor, and Amit Sahai. Concurrent zero-knowledge. J. ACM, 51(6):851-898, 2004.
-
(2004)
J. ACM
, vol.51
, Issue.6
, pp. 851-898
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
22
-
-
33745155794
-
On the generic insecurity of the full domain hash
-
Yevgeniy Dodis, Roberto Oliveira, and Krzysztof Pietrzak. On the generic insecurity of the full domain hash. In CRYPTO, pages 449-466, 2005.
-
(2005)
CRYPTO
, pp. 449-466
-
-
Dodis, Y.1
Oliveira, R.2
Pietrzak, K.3
-
23
-
-
0027684980
-
Random-self-reducibility of complete sets
-
Joan Feigenbaum and Lance Fortnow. Random-self-reducibility of complete sets. SIAM Journal on Computing, 22(5):994-1005, 1993.
-
(1993)
SIAM Journal on Computing
, vol.22
, Issue.5
, pp. 994-1005
-
-
Feigenbaum, J.1
Fortnow, L.2
-
24
-
-
0024984004
-
Witness indistinguishable and witness hiding protocols
-
Uriel Feige and Adi Shamir. Witness indistinguishable and witness hiding protocols. In STOC '90, pages 416-426, 1990.
-
(1990)
STOC '90
, pp. 416-426
-
-
Feige, U.1
Shamir, A.2
-
25
-
-
77954644602
-
On the impossibility of three-move blind signature schemes
-
Marc Fischlin and Dominique Schröder. On the impossibility of three-move blind signature schemes. In EUROCRYPT, pages 197-215, 2010.
-
(2010)
EUROCRYPT
, pp. 197-215
-
-
Fischlin, M.1
Schröder, D.2
-
26
-
-
0029767165
-
On the composition of zero-knowledge proof systems
-
Oded Goldreich and Hugo Krawczyk. On the composition of zero-knowledge proof systems. SIAM Journal on Computing, 25(1):169-192, 1996.
-
(1996)
SIAM Journal on Computing
, vol.25
, Issue.1
, pp. 169-192
-
-
Goldreich, O.1
Krawczyk, H.2
-
27
-
-
0344550529
-
On the (in)security of the fiat-shamir paradigm
-
Shafi Goldwasser and Yael Tauman Kalai. On the (in)security of the fiat-shamir paradigm. In FOCS '03, pages 102-111, 2003.
-
(2003)
FOCS '03
, pp. 102-111
-
-
Goldwasser, S.1
Kalai, Y.T.2
-
28
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Shafi Goldwasser, Silvio Micali, and Charles Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 18(1):186-208, 1989.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
29
-
-
84976832950
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
Oded Goldreich, Silvio Micali, and Avi Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM, 38(3):690-728, 1991.
-
(1991)
J. ACM
, vol.38
, Issue.3
, pp. 690-728
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
31
-
-
79959724747
-
Separating succint non-interactive arguments from all falsiable assumptions
-
To appear in
-
Craig Gentry and Daniel Wichs. Separating succint non-interactive arguments from all falsiable assumptions. To appear in STOC '11, 2011.
-
STOC '11, 2011
-
-
Gentry, C.1
Wichs, D.2
-
32
-
-
70350634168
-
On the (im)possibility of key dependent encryption
-
Iftach Haitner and Thomas Holenstein. On the (im)possibility of key dependent encryption. In TCC, pages 202-219, 2009.
-
(2009)
TCC
, pp. 202-219
-
-
Haitner, I.1
Holenstein, T.2
-
33
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Johan Håstad, Russell Impagliazzo, Leonid Levin, and Michael Luby. A pseudorandom generator from any one-way function. SIAM Journal on Computing, 28:12-24, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, pp. 12-24
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
34
-
-
70350630631
-
On the (im)possibility of arthur-merlin witness hiding protocols
-
Iftach Haitner, Alon Rosen, and Ronen Shaltiel. On the (im)possibility of arthur-merlin witness hiding protocols. In TCC, pages 220-237, 2009.
-
(2009)
TCC
, pp. 220-237
-
-
Haitner, I.1
Rosen, A.2
Shaltiel, R.3
-
35
-
-
79953182449
-
Limits on the provable consequences of one-way permutations
-
Russell Impagliazzo and Steven Rudich. Limits on the provable consequences of one-way permutations. In CRYPTO '88, pages 8-26, 1988.
-
(1988)
CRYPTO '88
, pp. 8-26
-
-
Impagliazzo, R.1
Rudich, S.2
-
36
-
-
0034830278
-
Concurrent and resettable zero-knowledge in poly-loalgorithm rounds
-
Joe Kilian and Erez Petrank. Concurrent and resettable zero-knowledge in poly-loalgorithm rounds. In STOC '01, pages 560-569, 2001.
-
(2001)
STOC '01
, pp. 560-569
-
-
Kilian, J.1
Petrank, E.2
-
37
-
-
0001448484
-
Bit commitment using pseudorandomness
-
Moni Naor. Bit commitment using pseudorandomness. Journal of Cryptology, 4:151-158, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 151-158
-
-
Naor, M.1
-
38
-
-
35248818856
-
On cryptographic assumptions and challenges
-
Moni Naor. On cryptographic assumptions and challenges. In CRYPTO, pages 96-109, 2003.
-
(2003)
CRYPTO
, pp. 96-109
-
-
Naor, M.1
-
39
-
-
84875762817
-
Provably secure and practical identication schemes and corresponding signature schemes
-
Tatsuaki Okamoto. Provably secure and practical identication schemes and corresponding signature schemes. In CRYPTO, pages 31-53, 1992.
-
(1992)
CRYPTO
, pp. 31-53
-
-
Okamoto, T.1
-
40
-
-
35248833045
-
Simulation in quasi-polynomial time, and its application to protocol composition
-
Rafael Pass. Simulation in quasi-polynomial time, and its application to protocol composition. In EUROCRYPT, pages 160-176, 2003.
-
(2003)
EUROCRYPT
, pp. 160-176
-
-
Pass, R.1
-
41
-
-
34247522422
-
Parallel repetition of zero-knowledge proofs and the possibility of basing cryptography on np-hardness
-
Rafael Pass. Parallel repetition of zero-knowledge proofs and the possibility of basing cryptography on np-hardness. In IEEE Conference on Computational Complexity, pages 96-110, 2006.
-
(2006)
IEEE Conference on Computational Complexity
, pp. 96-110
-
-
Pass, R.1
-
42
-
-
33748630216
-
Concurrent non-malleable commitments
-
Rafael Pass and Alon Rosen. Concurrent non-malleable commitments. In FOCS '05, pages 563-572, 2005.
-
(2005)
FOCS '05
, pp. 563-572
-
-
Pass, R.1
Rosen, A.2
-
43
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
David Pointcheval and Jacques Stern. Security arguments for digital signatures and blind signatures. J. Cryptology, 13(3):361-396, 2000.
-
(2000)
J. Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
45
-
-
40249103092
-
On constant-round concurrent zero-knowledge
-
Rafael Pass and Muthuramakrishnan Venkitasubramaniam. On constant-round concurrent zero-knowledge. In TCC '08, pages 553-570, 2008.
-
(2008)
TCC '08
, pp. 553-570
-
-
Pass, R.1
Venkitasubramaniam, M.2
-
46
-
-
84957621865
-
On the concurrent composition of zero-knowledge proofs
-
Ransom Richardson and Joe Kilian. On the concurrent composition of zero-knowledge proofs. In Eurocrypt '99, pages 415-432, 1999.
-
(1999)
Eurocrypt '99
, pp. 415-432
-
-
Richardson, R.1
Kilian, J.2
-
47
-
-
35048815001
-
Notions of reducibility between cryptographic primitives
-
Omer Reingold, Luca Trevisan, and Salil P. Vadhan. Notions of reducibility between cryptographic primitives. In TCC, pages 1-20, 2004.
-
(2004)
TCC
, pp. 1-20
-
-
Reingold, O.1
Trevisan, L.2
Vadhan, S.P.3
-
48
-
-
77953540366
-
Are pcps inherent in efficient arguments?
-
Guy N. Rothblum and Salil P. Vadhan. Are pcps inherent in efficient arguments? Computational Complexity, 19(2):265-304, 2010.
-
(2010)
Computational Complexity
, vol.19
, Issue.2
, pp. 265-304
-
-
Rothblum, G.N.1
Vadhan, S.P.2
-
49
-
-
12344258539
-
Efficient signature generation by smart cards
-
Claus-Peter Schnorr. Efficient signature generation by smart cards. J. Cryptology, 4(3):161-174, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.-P.1
-
50
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
Victor Shoup. Lower bounds for discrete logarithms and related problems. In EUROCRYPT, pages 256-266, 1997.
-
(1997)
EUROCRYPT
, pp. 256-266
-
-
Shoup, V.1
|