-
1
-
-
85079741714
-
-
The soundness of the above protocol relies on the assumption that the input x is picked independently of ρ. Otherwise it is not guaranteed that a random Πρ will
-
ρ will
-
-
-
-
2
-
-
33745116951
-
Secure computation of constant-depth circuits with applications to database search problems
-
Santa Barbara, CA, 2005, Springer-Verlag, Berlin
-
O. Barkol and Y. Ishai, Secure computation of constant-depth circuits with applications to database search problems, in Proceedings of the 25th Annual International Cryptology Conference (CRYPTO 2005), Santa Barbara, CA, 2005, Springer-Verlag, Berlin, 2005, pp. 395–411.
-
(2005)
Proceedings of the 25th Annual International Cryptology Conference (CRYPTO 2005)
, pp. 395-411
-
-
Barkol, O.1
Ishai, Y.2
-
3
-
-
0025174457
-
The (true) complexity of statistical zero knowledge
-
Baltimore, MD, ACM, New York
-
M. Bellare, S. Micali, and R. Ostrovsky, The (true) complexity of statistical zero knowledge, in Proceedings of the 22nd Annual ACM Symposium on Theory of Computing (STOC), Baltimore, MD, ACM, New York, 1990, pp. 494–502.
-
(1990)
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing (STOC)
, pp. 494-502
-
-
Bellare, M.1
Micali, S.2
Ostrovsky, R.3
-
4
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
ACM, New York
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation, in Proceedings of the 20th Annual ACM Symposium on the Theory of Computing (STOC), ACM, New York, 1988, pp. 1–10.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on the Theory of Computing (STOC)
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
0003030602
-
Coin flipping by telephone - A protocol for solving impossible problems
-
San Francisco, CA, 1982, IEEE Computer Society Press, Piscataway, NJ
-
M. Blum, Coin flipping by telephone - a protocol for solving impossible problems, in COMP-CON’82, Proceedings of the 24th IEEE Computer Society International Conference, San Francisco, CA, 1982, IEEE Computer Society Press, Piscataway, NJ, 1982, pp. 133–137.
-
(1982)
COMP-CON’82, Proceedings of the 24th IEEE Computer Society International Conference
, pp. 133-137
-
-
Blum, M.1
-
6
-
-
35448953543
-
Subquadratic zero-knowledge
-
J. Boyar, G. Brassard, and R. Peralta, Subquadratic zero-knowledge, J. ACM, 42 (1995), pp. 1169–1193.
-
(1995)
J. ACM
, vol.42
, pp. 1169-1193
-
-
Boyar, J.1
Brassard, G.2
Peralta, R.3
-
7
-
-
33745994328
-
Short non-interactive cryptographic proofs
-
J. Boyar, I. Damgård, and R. Peralta, Short non-interactive cryptographic proofs, J. Cryptology, 13 (2000), pp. 449–472.
-
(2000)
J. Cryptology
, vol.13
, pp. 449-472
-
-
Boyar, J.1
Damgård, I.2
Peralta, R.3
-
8
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti, Security and composition of multiparty cryptographic protocols, J. Cryptology, 13 (2000), pp. 143–202.
-
(2000)
J. Cryptology
, vol.13
, pp. 143-202
-
-
Canetti, R.1
-
9
-
-
84898947315
-
Multiparty unconditionally secure protocols (extended abstract)
-
ACM, New York
-
D. Chaum, C. Crépeau, and I. Damgård, Multiparty unconditionally secure protocols (extended abstract), in Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC), ACM, New York, 1988, pp. 11–19.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
10
-
-
33749554579
-
Algebraic geometric secret sharing schemes and secure multi-party computations over small fields
-
Santa Barbara, CA, Springer-Verlag, Berlin
-
H. Chen and R. Cramer, Algebraic geometric secret sharing schemes and secure multi-party computations over small fields, in Proceedings of the 26th Annual International Cryptology Conference (CRYPTO 2006), Santa Barbara, CA, Springer-Verlag, Berlin, 2006, pp. 521–536.
-
(2006)
Proceedings of the 26th Annual International Cryptology Conference (CRYPTO 2006)
, pp. 521-536
-
-
Chen, H.1
Cramer, R.2
-
11
-
-
0030679475
-
Linear zero-knowledge—A note on efficient zero-knowledge proofs and arguments
-
El Paso, TX, ACM, New York
-
R. Cramer and I. Damgård, Linear zero-knowledge—A note on efficient zero-knowledge proofs and arguments, in Proceedings of the 29th Annual ACM Symposium on Theory of Computing (STOC), El Paso, TX, ACM, New York, 1997, pp. 436–445.
-
(1997)
Proceedings of the 29th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 436-445
-
-
Cramer, R.1
Damgård, I.2
-
12
-
-
84957680703
-
Zero-knowledge proofs for finite field arithmetic; or: Can zero-knowledge be for free?
-
Springer, New York
-
R. Cramer and I. Damgård, Zero-knowledge proofs for finite field arithmetic; or: Can zero-knowledge be for free?, in Advances in Cryptology (CRYPTO’98), Lecture Notes in Comput. Sci. 1462, Springer, New York, 1998, pp. 424–441.
-
(1998)
Advances in Cryptology (CRYPTO’98), Lecture Notes in Comput. Sci.
, vol.1462
, pp. 424-441
-
-
Cramer, R.1
Damgård, I.2
-
13
-
-
33745124039
-
Constant-round multiparty computation using a black-box pseudorandom generator
-
Santa Barbara, CA, Springer-Verlag, Berlin
-
I. Damgård and Y. Ishai, Constant-round multiparty computation using a black-box pseudorandom generator, in Proceedings of the 25th Annual International Cryptology Conference (CRYPTO 2005), Santa Barbara, CA, Springer-Verlag, Berlin, 2005, pp. 378–394.
-
(2005)
Proceedings of the 25th Annual International Cryptology Conference (CRYPTO 2005)
, pp. 378-394
-
-
Damgård, I.1
Ishai, Y.2
-
14
-
-
33749557660
-
Scalable secure multiparty computation
-
Santa Barbara, CA, Springer-Verlag, Berlin
-
I. Damgård and Y. Ishai, Scalable secure multiparty computation, in Proceedings of the 26th Annual International Cryptology Conference (CRYPTO 2006), Santa Barbara, CA, Springer-Verlag, Berlin, 2006, pp. 501–520.
-
(2006)
Proceedings of the 26th Annual International Cryptology Conference (CRYPTO 2006)
, pp. 501-520
-
-
Damgård, I.1
Ishai, Y.2
-
15
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel, A randomized protocol for signing contracts, Comm. ACM, 28 (1985), pp. 637–647.
-
(1985)
Comm. ACM
, vol.28
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
16
-
-
0026985378
-
Communication complexity of secure computation
-
Victoria, BC, Canada, ACM, New York
-
M. K. Franklin and M. Yung, Communication complexity of secure computation, in Proceedings of the 24th Annual ACM Symposium on Theory of Computing (STOC), Victoria, BC, Canada, ACM, New York, 1992, pp. 699–710.
-
(1992)
Proceedings of the 24th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 699-710
-
-
Franklin, M.K.1
Yung, M.2
-
19
-
-
0000108216
-
How to construct constant-round zero-knowledge proof systems for NP
-
O. Goldreich and A. Kahan, How to construct constant-round zero-knowledge proof systems for NP, J. Cryptology, 9 (1996), pp. 167–190.
-
(1996)
J. Cryptology
, vol.9
, pp. 167-190
-
-
Goldreich, O.1
Kahan, A.2
-
20
-
-
0344794411
-
On the complexity of interactive proofs with bounded communication
-
O. Goldreich and J. Håstad, On the complexity of interactive proofs with bounded communication, Inform. Process. Lett., 67 (1998), pp. 205–214.
-
(1998)
Inform. Process. Lett.
, vol.67
, pp. 205-214
-
-
Goldreich, O.1
Håstad, J.2
-
21
-
-
85032868051
-
How to prove all NP-statements in zero-knowledge, and a methodology of cryptographic protocol design
-
Springer, New York
-
O. Goldreich, S. Micali, and A. Wigderson, How to prove all NP-statements in zero-knowledge, and a methodology of cryptographic protocol design, in Advances in Cryptology (CRYPTO’86), Lecture Notes in Comput. Sci. 263, Springer, New York, 1987, pp. 171–185.
-
(1987)
Advances in Cryptology (CRYPTO’86), Lecture Notes in Comput. Sci.
, vol.263
, pp. 171-185
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
0023545076
-
How to play any mental game (extended abstract)
-
New York, NY, 1987, ACM, New York
-
O. Goldreich, S. Micali, and A. Wigderson, How to play any mental game (extended abstract), in Proceedings of the 19th Annual ACM Symposium on Theory of Computing (STOC), New York, NY, 1987, ACM, New York, 1987, pp. 218–229.
-
(1987)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
23
-
-
0028676264
-
Definitions and properties of zero-knowledge proof systems
-
O. Goldreich and Y. Oren, Definitions and properties of zero-knowledge proof systems, J. Cryptology, 7 (1994), pp. 1–32.
-
(1994)
J. Cryptology
, vol.7
, pp. 1-32
-
-
Goldreich, O.1
Oren, Y.2
-
24
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
Victoria, BC, Canada, ACM, New York
-
S. Goldwasser, Y. T. Kalai, and G. Rothblum, Delegating computation: Interactive proofs for muggles, in Proceedings of the 40th Annual ACM Symposium on Theory of Computing (STOC), Victoria, BC, Canada, ACM, New York, 2008, pp. 113–122.
-
(2008)
Proceedings of the 40th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.3
-
25
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof systems, SIAM J. Comput., 18 (1989), pp. 186–208.
-
(1989)
SIAM J. Comput.
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
26
-
-
33746072569
-
Perfect non-interactive zero knowledge for NP
-
Saint Petersburg, Russia, 2006, Lecture Notes in Comput. Sci. Springer, New York
-
J. Groth, R. Ostrovsky, and A. Sahai, Perfect non-interactive zero knowledge for NP, in Proceedings of the 25th International Cryptology Conference (EUROCRYPT 2006), Saint Petersburg, Russia, 2006, Lecture Notes in Comput. Sci. 4004, Springer, New York, 2006, pp. 339–358.
-
(2006)
Proceedings of the 25th International Cryptology Conference (EUROCRYPT 2006)
, vol.4004
, pp. 339-358
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
28
-
-
35448982726
-
Statistically-hiding commitment from any one-way function
-
San Diego, CA, ACM, New York
-
I. Haitner and O. Reingold, Statistically-hiding commitment from any one-way function, in Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC), San Diego, CA, ACM, New York, 2007, pp. 1–10.
-
(2007)
Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 1-10
-
-
Haitner, I.1
Reingold, O.2
-
29
-
-
40249091385
-
OT-combiners from secure computation
-
New York, NY
-
D. Harnik, Y. Ishai, E. Kushilevitz, and J. B. Nielsen, OT-combiners from secure computation, in Proceedings of the 5th IACR Theory of Cryptology Conference (TCC 2008), New York, NY, 2008, pp. 393–411.
-
(2008)
Proceedings of the 5th IACR Theory of Cryptology Conference (TCC 2008)
, pp. 393-411
-
-
Harnik, D.1
Ishai, Y.2
Kushilevitz, E.3
Nielsen, J.B.4
-
30
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby, A pseudorandom generator from any one-way function, SIAM J. Comput., 28 (1999), pp. 1364–1396.
-
(1999)
SIAM J. Comput.
, vol.28
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
31
-
-
35048829207
-
Limits on the provable consequences of one-way permutations
-
Springer, New York
-
R. Impagliazzo and S. Rudich, Limits on the provable consequences of one-way permutations, in Advances in Cryptology (CRYPTO’88), Lecture Notes in Comput. Sci. 403, Springer, New York, 1990, pp. 8–26.
-
(1990)
Advances in Cryptology (CRYPTO’88), Lecture Notes in Comput. Sci.
, vol.403
, pp. 8-26
-
-
Impagliazzo, R.1
Rudich, S.2
-
32
-
-
33748112416
-
Black-box constructions for secure computation
-
Seattle, WA, ACM, New York
-
Y. Ishai, E. Kushilevitz, Y. Lindell, and E. Petrank, Black-box constructions for secure computation, in Proceedings of the 38th Annual ACM Symposium on Theory of Computing (STOC), Seattle, WA, ACM, New York, 2006, pp. 99–108.
-
(2006)
Proceedings of the 38th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 99-108
-
-
Ishai, Y.1
Kushilevitz, E.2
Lindell, Y.3
Petrank, E.4
-
33
-
-
35448945589
-
Zero-knowledge from secure multiparty computation
-
San Diego, CA, ACM, New York
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, Zero-knowledge from secure multiparty computation, in Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC), San Diego, CA, ACM, New York, 2007, pp. 21–30.
-
(2007)
Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 21-30
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
34
-
-
51849102397
-
Founding cryptography on oblivious transfer—efficiently
-
Santa Barbara, CA, Springer-Verlag, Berlin
-
Y. Ishai, M. Prabhakaran, and A. Sahai, Founding cryptography on oblivious transfer—efficiently, in Proceedings of the 28th Annual International Cryptology Conference (CRYPTO 2008), Santa Barbara, CA, Springer-Verlag, Berlin, 2008, pp. 572–591.
-
(2008)
Proceedings of the 28th Annual International Cryptology Conference (CRYPTO 2008)
, pp. 572-591
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
35
-
-
35448941247
-
Succinct non-interactive zero-knowledge proofs with preprocessing for LOGSNP
-
Berkeley, CA, IEEE Computer Society Press, Piscataway, NJ
-
Y. T. Kalai and R. Raz, Succinct non-interactive zero-knowledge proofs with preprocessing for LOGSNP, in Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS), Berkeley, CA, IEEE Computer Society Press, Piscataway, NJ, 2006, pp. 355–366.
-
(2006)
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 355-366
-
-
Kalai, Y.T.1
Raz, R.2
-
36
-
-
49049120522
-
Interactive PCP
-
Reykjavik, Iceland, Springer, New York
-
Y. T. Kalai and R. Raz, Interactive PCP, in Proceedings of the 35th International Colloquium on Automata, Languages and Programming (ICALP), Reykjavik, Iceland, Springer, New York, 2008, pp. 536–547.
-
(2008)
Proceedings of the 35th International Colloquium on Automata, Languages and Programming (ICALP)
, pp. 536-547
-
-
Kalai, Y.T.1
Raz, R.2
-
38
-
-
0026963441
-
A note on efficient zero-knowledge proofs and arguments (extended abstract)
-
Victoria, BC, Canada, ACM, New York
-
J. Kilian, A note on efficient zero-knowledge proofs and arguments (extended abstract), in Proceedings of the 24th Annual ACM Symposium on Theory of Computing (STOC), Victoria, BC, Canada, ACM, New York, 1992, pp. 723–732.
-
(1992)
Proceedings of the 24th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 723-732
-
-
Kilian, J.1
-
39
-
-
0033725451
-
Reducibility and completeness in private computations
-
J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky, Reducibility and completeness in private computations, SIAM J. Comput., 29 (2000), pp. 1189–1208.
-
(2000)
SIAM J. Comput.
, vol.29
, pp. 1189-1208
-
-
Kilian, J.1
Kushilevitz, E.2
Micali, S.3
Ostrovsky, R.4
-
40
-
-
26444540011
-
An efficient noninteractive zero-knowledge proof system for NP with general assumptions
-
J. Kilian and E. Petrank, An efficient noninteractive zero-knowledge proof system for NP with general assumptions, J. Cryptology, 11 (1998), pp. 1–27.
-
(1998)
J. Cryptology
, vol.11
, pp. 1-27
-
-
Kilian, J.1
Petrank, E.2
-
41
-
-
0024769470
-
Minimum resource zero-knowledge proofs
-
Research Triangle Park, NC, IEEE Computer Society Press, Piscataway, NJ
-
J. Kilian, S. Micali, and R. Ostrovsky, Minimum resource zero-knowledge proofs, in Proceedings of the 30th Annual IEEE Symposium on Foundations of Computer Science (FOCS), Research Triangle Park, NC, IEEE Computer Society Press, Piscataway, NJ, 1989, pp. 474–479.
-
(1989)
Proceedings of the 30th Annual IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 474-479
-
-
Kilian, J.1
Micali, S.2
Ostrovsky, R.3
-
42
-
-
84968329589
-
Reducibility and completeness in multi-party private computations
-
Santa Fe, NM, IEEE Computer Society Press, Piscataway, NJ
-
E. Kushilevitz, S. Micali, and R. Ostrovsky, Reducibility and completeness in multi-party private computations, in Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science (FOCS), Santa Fe, NM, IEEE Computer Society Press, Piscataway, NJ, 1994, pp. 478–489.
-
(1994)
Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 478-489
-
-
Kushilevitz, E.1
Micali, S.2
Ostrovsky, R.3
-
43
-
-
35248845362
-
Secure multi-party computation made simple
-
Springer, New York
-
U. Maurer, Secure multi-party computation made simple, in Proceedings of the Third Conference on Security in Communication Networks (SCN 2002), Almafi, Italy, Lecture Notes in Comput. Sci. 2576, Springer, New York, 2002, pp. 14–28.
-
(2002)
Proceedings of the Third Conference on Security in Communication Networks (SCN 2002), Almafi, Italy, Lecture Notes in Comput. Sci.
, vol.2576
, pp. 14-28
-
-
Maurer, U.1
-
44
-
-
0034854953
-
Computationally sound proofs
-
S. Micali, Computationally sound proofs, SIAM J. Comput., 30 (2000), pp. 1253–1298.
-
(2000)
SIAM J. Comput.
, vol.30
, pp. 1253-1298
-
-
Micali, S.1
-
45
-
-
0001448484
-
Bit commitment using pseudorandomness
-
M. Naor, Bit commitment using pseudorandomness, J. Cryptology, 4 (1991), pp. 151–158.
-
(1991)
J. Cryptology
, vol.4
, pp. 151-158
-
-
Naor, M.1
-
46
-
-
0008519096
-
One-way functions are essential for non-trivial zero-knowledge
-
Natanya, Israel, IEEE Computer Society Press, Piscataway, NJ
-
R. Ostrovsky and A. Wigderson, One-way functions are essential for non-trivial zero-knowledge, in Proceedings of the Second Israel Symposium on Theory of Computing and Systems (ISTCS), Natanya, Israel, IEEE Computer Society Press, Piscataway, NJ, 1993, pp. 3–17.
-
(1993)
Proceedings of the Second Israel Symposium on Theory of Computing and Systems (ISTCS)
, pp. 3-17
-
-
Ostrovsky, R.1
Wigderson, A.2
-
47
-
-
0036957024
-
Concurrent zero-knowledge with logarithmic round complexity
-
Vancouver, BC, Canada, IEEE Computer Society Press, Piscataway, NJ
-
M. Prabhakaran, A. Rosen, and A. Sahai, Concurrent zero-knowledge with logarithmic round complexity, in Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS), Vancouver, BC, Canada, IEEE Computer Society Press, Piscataway, NJ, 2002, pp. 366–375.
-
(2002)
Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 366-375
-
-
Prabhakaran, M.1
Rosen, A.2
Sahai, A.3
-
48
-
-
0003462641
-
-
Technical Memo TR-81, Aiken Computation Laboratory, Harvard University, Cambridge, MA
-
M. Rabin, How to Exchange Secrets by Oblivious Transfer, Technical Memo TR-81, Aiken Computation Laboratory, Harvard University, Cambridge, MA, 1981.
-
(1981)
How to Exchange Secrets by Oblivious Transfer
-
-
Rabin, M.1
-
49
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
Seattle, WA, ACM, New York
-
T. Rabin and M. Ben-Or, Verifiable secret sharing and multiparty protocols with honest majority, in Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC), Seattle, WA, ACM, New York, 1989, pp. 73–85.
-
(1989)
Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC)
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
50
-
-
26944478724
-
Lower bounds for the size of circuits of bounded depth with basis (AND, XOR)
-
A. Razborov, Lower bounds for the size of circuits of bounded depth with basis (AND, XOR), Math. Notes Acad. Sci. USSR, 41 (1987), pp. 333–338.
-
(1987)
Math. Notes Acad. Sci. USSR
, vol.41
, pp. 333-338
-
-
Razborov, A.1
-
51
-
-
84947798969
-
Notions of reducibility between cryptographic primitives
-
Cambridge, MA
-
O. Reingold, L. Trevisan, and S. P. Vadhan, Notions of reducibility between cryptographic primitives, in Proceedings of the 1st Theory of Cryptology Conference (TCC), Cambridge, MA, 2004, pp. 1–20.
-
(2004)
Proceedings of the 1st Theory of Cryptology Conference (TCC)
, pp. 1-20
-
-
Reingold, O.1
Trevisan, L.2
Vadhan, S.P.3
-
53
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Comm. ACM, 22 (1979), pp. 612–613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
54
-
-
0023570259
-
Algebraic methods in the theory of lower bound for Boolean circuit complexity
-
New York, NY, ACM, New York
-
R. Smolensky, Algebraic methods in the theory of lower bound for Boolean circuit complexity, in Proceedings of the 19th Annual ACM Symposium on Theory of Computing (STOC), New York, NY, ACM, New York, 1987, pp. 77–82.
-
(1987)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 77-82
-
-
Smolensky, R.1
-
55
-
-
0022882770
-
How to generate and exchange secrets
-
Toronto, Canada, IEEE Computer Society Press, Piscataway, NJ
-
A. C. Yao, How to generate and exchange secrets, in Proceedings of the 27th Annual IEEE Symposium on Foundations of Computer Science (FOCS), Toronto, Canada, IEEE Computer Society Press, Piscataway, NJ, 1986, pp. 162–167.
-
(1986)
Proceedings of the 27th Annual IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 162-167
-
-
Yao, A.C.1
|