-
1
-
-
84974573487
-
Fast Verification of Any Remote Procedure Call: Short Witness-Indistinguishable One-Round Proofs for NP
-
Montanari, U., Rolim, J.D.P., Welzl, E. (eds.) ICALP 2000. Springer, Heidelberg
-
Aiello, W., Bhatt, S.N., Ostrovsky, R., Rajagopalan, S.: Fast Verification of Any Remote Procedure Call: Short Witness-Indistinguishable One-Round Proofs for NP. In: Montanari, U., Rolim, J.D.P., Welzl, E. (eds.) ICALP 2000. LNCS, vol. 1853, pp. 463-474. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1853
, pp. 463-474
-
-
Aiello, W.1
Bhatt, S.N.2
Ostrovsky, R.3
Rajagopalan, S.4
-
2
-
-
0035166072
-
How to go beyond the black-box simulation barrier
-
IEEE, Las Vegas preliminary full version
-
Barak, B.: How to go beyond the black-box simulation barrier. In: 42nd Annual Symposium on Foundations of Computer Science, pp. 106-115. IEEE, Las Vegas (2001), preliminary full version http://www.wisdom.weizmann.ac.il/~boaz
-
(2001)
42nd Annual Symposium on Foundations of Computer Science
, pp. 106-115
-
-
Barak, B.1
-
3
-
-
80051984165
-
Leftover Hash Lemma, Revisited
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Barak, B., Dodis, Y., Krawczyk, H., Pereira, O., Pietrzak, K., Standaert, F.-X., Yu, Y.: Leftover Hash Lemma, Revisited. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 1-20. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 1-20
-
-
Barak, B.1
Dodis, Y.2
Krawczyk, H.3
Pereira, O.4
Pietrzak, K.5
Standaert, F.-X.6
Yu, Y.7
-
4
-
-
32844469026
-
Lower bounds for non-black-box zero knowledge
-
special Issue on FOCS 2003
-
Barak, B., Lindell, Y., Vadhan, S.: Lower bounds for non-black-box zero knowledge. Journal of Computer and System Sciences 72(2), 321-391 (2006), special Issue on FOCS 2003
-
(2006)
Journal of Computer and System Sciences
, vol.72
, Issue.2
, pp. 321-391
-
-
Barak, B.1
Lindell, Y.2
Vadhan, S.3
-
5
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Denning, D., Pyle, R., Ganesan, R., Sandhu, R., Ashby, V. (eds.) ACM
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Denning, D., Pyle, R., Ganesan, R., Sandhu, R., Ashby, V. (eds.) First ACM Conference on Computer and Communication Security, November 3-5, pp. 62-73. ACM (1993)
-
(1993)
First ACM Conference on Computer and Communication Security, November 3-5
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
0036041924
-
Randomness conductors and constant-degree lossless expanders
-
ACM, Montréal joint session with CCC 2002
-
Capalbo, M., Reingold, O., Vadhan, S., Wigderson, A.: Randomness conductors and constant-degree lossless expanders. In: 34th Annual ACM Symposium on Theory of Computing (STOC 2002), pp. 659-668. ACM, Montréal (2002); joint session with CCC 2002
-
(2002)
34th Annual ACM Symposium on Theory of Computing (STOC 2002)
, pp. 659-668
-
-
Capalbo, M.1
Reingold, O.2
Vadhan, S.3
Wigderson, A.4
-
8
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing 17(2), 230-261 (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
9
-
-
0022198802
-
The bit extraction problem or t-resilient functions
-
Chor, B., Goldreich, O., H̊astad, J., Friedman, J., Rudich, S., Smolensky, R.: The bit extraction problem or t-resilient functions. In: Proceedings of the 26th IEEE Symposium on Foundation of Computer Science, pp. 396-407 (1985)
-
(1985)
Proceedings of the 26th IEEE Symposium on Foundation of Computer Science
, pp. 396-407
-
-
Chor, B.1
Goldreich, O.2
H̊astad, J.3
Friedman, J.4
Rudich, S.5
Smolensky, R.6
-
10
-
-
85016672373
-
Proof of Partial Knowledge and Simplified Design of Witness Hiding Protocols
-
Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
-
Cramer, R., Damgård, I., Schoenmakers, B.: Proof of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
11
-
-
20544433132
-
Improved Randomness Extraction from Two Independent Sources
-
Jansen, K., Khanna, S., Rolim, J.D.P., Ron, D. (eds.) APPROX 2004 and RANDOM2004. Springer, Heidelberg
-
Dodis, Y., Elbaz, A., Oliveira, R., Raz, R.: Improved Randomness Extraction from Two Independent Sources. In: Jansen, K., Khanna, S., Rolim, J.D.P., Ron, D. (eds.) APPROX 2004 and RANDOM2004. LNCS, vol. 3122, pp. 334-344. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3122
, pp. 334-344
-
-
Dodis, Y.1
Elbaz, A.2
Oliveira, R.3
Raz, R.4
-
12
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing 38(1), 97-139 (2008)
-
(2008)
SIAM Journal on Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
13
-
-
84858301740
-
-
full version of this paper. Available from authors'websites
-
Dodis, Y., Ristenpart, T., Vadhan, S.: Randomness condensers for efficiently samplable, seed-dependent sources, full version of this paper. Available from authors'websites
-
Randomness Condensers for Efficiently Samplable, Seed-dependent Sources
-
-
Dodis, Y.1
Ristenpart, T.2
Vadhan, S.3
-
14
-
-
0033332890
-
Magic functions
-
IEEE, New York
-
Dwork, C., Naor, M., Reingold, O., Stockmeyer, L.: Magic functions. In: 40th Annual Symposium on Foundations of Computer Science, pp. 523-534. IEEE, New York (1999)
-
(1999)
40th Annual Symposium on Foundations of Computer Science
, pp. 523-534
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Stockmeyer, L.4
-
15
-
-
84990731886
-
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
-
Odlyzko, A.M. (ed.) CRYPTO 1986. Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
16
-
-
0029767165
-
On the composition of zero-knowledge proof systems
-
Goldreich, O., Krawczyk, H.: On the composition of zero-knowledge proof systems. SIAM Journal on Computing 25(1), 169-192 (1996)
-
(1996)
SIAM Journal on Computing
, vol.25
, Issue.1
, pp. 169-192
-
-
Goldreich, O.1
Krawczyk, H.2
-
18
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal on Computing 18, 186-208 (1989)
-
(1989)
SIAM Journal on Computing
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
19
-
-
84947558992
-
A "Paradoxical" Identity-Based Signature Scheme Resulting from Zero-Knowledge
-
Goldwasser, S. (ed.) CRYPTO 1988. Springer, Heidelberg
-
Guillou, L.C., Quisquater, J.-J.: A "Paradoxical" Identity-Based Signature Scheme Resulting from Zero-Knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216-231. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.403
, pp. 216-231
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
20
-
-
68549120859
-
Unbalanced expanders and randomness extractors from parvaresh-vardy codes
-
Guruswami, V., Umans, C., Vadhan, S.P.: Unbalanced expanders and randomness extractors from parvaresh-vardy codes. J. ACM 56(4) (2009)
-
(2009)
J. ACM
, vol.56
, Issue.4
-
-
Guruswami, V.1
Umans, C.2
Vadhan, S.P.3
-
21
-
-
33751027155
-
Analysis of the linux random number generator
-
IEEE Computer Society
-
Gutterman, Z., Pinkas, B., Reinman, T.: Analysis of the linux random number generator. In: 27th IEEE Symposium on Security and Privacy, pp. 371-385. IEEE Computer Society (2006)
-
(2006)
27th IEEE Symposium on Security and Privacy
, pp. 371-385
-
-
Gutterman, Z.1
Pinkas, B.2
Reinman, T.3
-
22
-
-
70350343384
-
Probabilistically Checkable Arguments
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Kalai, Y.T., Raz, R.: Probabilistically Checkable Arguments. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 143-159. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 143-159
-
-
Kalai, Y.T.1
Raz, R.2
-
23
-
-
33748100350
-
Deterministic extractors for small-space sources
-
Kleinberg, J.M. (ed.) May 21-23, ACM, Seattle
-
Kamp, J., Rao, A., Vadhan, S.P., Zuckerman, D.: Deterministic extractors for small-space sources. In: Kleinberg, J.M. (ed.) STOC, May 21-23, pp. 691-700. ACM, Seattle (2006)
-
(2006)
STOC
, pp. 691-700
-
-
Kamp, J.1
Rao, A.2
Vadhan, S.P.3
Zuckerman, D.4
-
25
-
-
33646844308
-
Generalized Strong Extractors and Deterministic Privacy Amplification
-
Smart, N.P. (ed.) Cryptography and Coding 2005. Springer, Heidelberg
-
Koenig, R., Maurer, U.: Generalized Strong Extractors and Deterministic Privacy Amplification. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 322-339. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3796
, pp. 322-339
-
-
Koenig, R.1
Maurer, U.2
-
26
-
-
0012523366
-
Some extremal problems arising from discrete control processes
-
Lichtenstein, D., Linial, N., Saks, M.: Some extremal problems arising from discrete control processes. Combinatorica 9(3), 269-287 (1989)
-
(1989)
Combinatorica
, vol.9
, Issue.3
, pp. 269-287
-
-
Lichtenstein, D.1
Linial, N.2
Saks, M.3
-
28
-
-
0032650476
-
On recycling the randomness of states in space bounded computation
-
(electronic). ACM, New York
-
Raz, R., Reingold, O.: On recycling the randomness of states in space bounded computation. In: Annual ACM Symposium on Theory of Computing, Atlanta, GA, pp. 159-168 (electronic). ACM, New York (1999), http://dx.doi.org/10.1145/ 301250.301294
-
(1999)
Annual ACM Symposium on Theory of Computing, Atlanta, GA
, pp. 159-168
-
-
Raz, R.1
Reingold, O.2
-
29
-
-
33750154710
-
Extracting randomness via repeated condensing
-
(electronic)
-
Reingold, O., Shaltiel, R., Wigderson, A.: Extracting randomness via repeated condensing. SIAM Journal on Computing 35(5), 1185-1209 (electronic) (2006), http://dx.doi.org/10.1137/S0097539703431032
-
(2006)
SIAM Journal on Computing
, vol.35
, Issue.5
, pp. 1185-1209
-
-
Reingold, O.1
Shaltiel, R.2
Wigderson, A.3
-
30
-
-
0021469810
-
Generating quasi-random sequences from semi-random sources
-
Santha, M., Vazirani, U.V.: Generating quasi-random sequences from semi-random sources. J. Comput. Syst. Sci. 33(1), 75-87 (1986)
-
(1986)
J. Comput. Syst. Sci.
, vol.33
, Issue.1
, pp. 75-87
-
-
Santha, M.1
Vazirani, U.V.2
-
31
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161-174 (1991)
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
32
-
-
84880883264
-
Improved Online/Offline Signature Schemes
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Shamir, A., Tauman, Y.: Improved Online/Offline Signature Schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355-367. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
33
-
-
34248175874
-
Lossless condensers, unbalanced expanders, and extractors
-
Ta-Shma, A., Umans, C., Zuckerman, D.: Lossless condensers, unbalanced expanders, and extractors. Combinatorica 27(2), 213-240 (2007), http://dx.doi.org/10.1007/s00493-007-0053-2
-
(2007)
Combinatorica
, vol.27
, Issue.2
, pp. 213-240
-
-
Ta-Shma, A.1
Umans, C.2
Zuckerman, D.3
|