-
3
-
-
33748525872
-
Stock market manipulation-theory and evidence
-
R.K. Aggarwal and G. Wu. Stock market manipulation-theory and evidence. Journal of Business, 79(4) 2003.
-
(2003)
Journal of Business
, vol.79
, Issue.4
-
-
Aggarwal, R.K.1
Wu, G.2
-
4
-
-
0001670120
-
Two Practical and Provably Secure Block Ciphers: BEARS and LION
-
R.J. Anderson and E. Biham. Two Practical and Provably Secure Block Ciphers: BEARS and LION. FSE 1996.
-
(1996)
FSE
-
-
Anderson, R.J.1
Biham, E.2
-
5
-
-
0021980820
-
Trading group theory for randomness
-
L. Babai. Trading group theory for randomness. STOC 1985.
-
(1985)
STOC
-
-
Babai, L.1
-
6
-
-
33745781447
-
A model and architecture for pseudorandom generation and applications to /dev/random
-
B. Barak and S. Halevi. A model and architecture for pseudorandom generation and applications to /dev/random. CCS 2005.
-
(2005)
CCS
-
-
Barak, B.1
Halevi, S.2
-
7
-
-
85015692260
-
The pricing of options and corporate liabilities
-
F. Black and M. Scholes. The pricing of options and corporate liabilities. Journal of Political Economy, 81(3), 1973.
-
(1973)
Journal of Political Economy
, vol.81
, Issue.3
-
-
Black, F.1
Scholes, M.2
-
8
-
-
0003153237
-
Non-interactive zero-knowledge and its applications
-
M. Blum, P. Feldman, and S. Micali. Non-interactive zero-knowledge and its applications. STOC 1988.
-
(1988)
STOC
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
9
-
-
0012970453
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. CRYPTO 2005.
-
(2005)
CRYPTO
-
-
Boneh, D.1
Franklin, M.2
-
10
-
-
46749095580
-
Cryptography from Sunspots: How to Use an Imperfect Reference String
-
R. Canetti, R. Pass and a. shelat. Cryptography from Sunspots: How to Use an Imperfect Reference String. FOCS 2007.
-
(2007)
FOCS
-
-
Canetti, R.1
Pass, R.2
shelat, a.3
-
11
-
-
80052018605
-
Scantegrity II: end-to-end verifiability for optical scan election systems using invisible ink confirmation codes
-
D. Chaum, R. Carback, J. Clark, A. Essex, S. Popoveniuc, R. L. Rivest, P. Y. A. Ryan, E. Shen, and A. T. Sherman. Scantegrity II: end-to-end verifiability for optical scan election systems using invisible ink confirmation codes. EVT 2008.
-
(2008)
EVT
-
-
Chaum, D.1
Carback, R.2
Clark, J.3
Essex, A.4
Popoveniuc, S.5
Rivest, R. L.6
Ryan, P. Y. A.7
Shen, E.8
Sherman, A. T.9
-
12
-
-
85092119438
-
Secure and observable auditing of electronic voting systems using stock indices
-
J. Clark, A. Essex, and C. Adams. Secure and observable auditing of electronic voting systems using stock indices. IEEE CCECE 2007.
-
(2007)
IEEE CCECE
-
-
Clark, J.1
Essex, A.2
Adams, C.3
-
17
-
-
85029449300
-
Randomness extraction and key derivation using the CBC, Cascade and HMAC modes
-
Y. Dodis, R. Gennaro, J. Hastad, H. Krawczyk, and T. Rabin. Randomness extraction and key derivation using the CBC, Cascade and HMAC modes. CRYPTO 2004.
-
(2004)
CRYPTO
-
-
Dodis, Y.1
Gennaro, R.2
Hastad, J.3
Krawczyk, H.4
Rabin, T.5
-
18
-
-
85092091263
-
A verifiable random function with short proofs and keys
-
PKC
-
Y. Dodis and A. Yampolskiy. A verifiable random function with short proofs and keys. PKC 2005.
-
(2005)
-
-
Dodis, Y.1
Yampolskiy, A.2
-
22
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. CACM, 28(6), 1985.
-
(1985)
CACM
, vol.28
, Issue.6
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
23
-
-
51349124871
-
Extractors for binary elliptic curves
-
R.R. Farashahi, R. Pellikaan, and A. Sidorenko. Extractors for binary elliptic curves. Designs, Codes, and Cryptography, 49, 2008.
-
(2008)
Designs, Codes, and Cryptography
, vol.49
-
-
Farashahi, R.R.1
Pellikaan, R.2
Sidorenko, A.3
-
24
-
-
0000097412
-
How to prove yourself: practical solutions to identification and signature problems
-
A. Fiat, and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. CRYPTO 1986.
-
(1986)
CRYPTO
-
-
Fiat, A.1
Shamir, A.2
-
25
-
-
0344550529
-
On the (in)security of the Fiat-Shamir paradigm
-
S. Goldwasser and Y. Kalai. On the (in)security of the Fiat-Shamir paradigm. FOCS 2003.
-
(2003)
FOCS
-
-
Goldwasser, S.1
Kalai, Y.2
-
26
-
-
0040597467
-
Private coins versus public coins in interactive proof systems
-
S. Goldwasser and M. Sipser. Private coins versus public coins in interactive proof systems. STOC 1986.
-
(1986)
STOC
-
-
Goldwasser, S.1
Sipser, M.2
-
27
-
-
84970903657
-
Efficient non-interactive proof systems for bilinear groups
-
J. Groth and A. Sahai. Efficient non-interactive proof systems for bilinear groups. EUROCRYPT 2008.
-
(2008)
EUROCRYPT
-
-
Groth, J.1
Sahai, A.2
-
28
-
-
77952326595
-
Harvesting verifiable challenges from oblivious online sources
-
A. Halderman and B. Waters. Harvesting verifiable challenges from oblivious online sources. CCS 2007.
-
(2007)
CCS
-
-
Halderman, A.1
Waters, B.2
-
30
-
-
74049149025
-
-
(State of California's Post-Election Audit Standards Working Group). Report
-
D. Jefferson, E. Ginnold, K. Midstokke, K. Alexander, P. Stark, and A. Lehmkuhl (State of California's Post-Election Audit Standards Working Group). Evaluation of Audit Sampling Models and Options for Strengthening Californias Manual Count. Report, 2007.
-
(2007)
Evaluation of Audit Sampling Models and Options for Strengthening Californias Manual Count
-
-
Jefferson, D.1
Ginnold, E.2
Midstokke, K.3
Alexander, K.4
Stark, P.5
Lehmkuhl, A.6
-
31
-
-
0034188149
-
How to Turn Loaded Dice into Fair Coins
-
A. Juels, M Jakobsson, E. Shriver, and B. Hillyer. How to Turn Loaded Dice into Fair Coins. IEEE Transactions on Information Theory, 46(3), 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.3
-
-
Juels, A.1
Jakobsson, M2
Shriver, E.3
Hillyer, B.4
-
34
-
-
0041877169
-
Estimation of entropy and mutual information
-
L. Paninski. Estimation of entropy and mutual information. Neural Computation, 15, 2003.
-
(2003)
Neural Computation
, vol.15
-
-
Paninski, L.1
-
36
-
-
85092097621
-
On the security of election audits with low entropy randomness
-
E. Rescorla. On the security of election audits with low entropy randomness. EVT 2009.
-
(2009)
EVT
-
-
Rescorla, E.1
-
37
-
-
0442307356
-
Brownian excursions and Parisian barrier options: a note
-
M. Schroder. Brownian excursions and Parisian barrier options: a note. Advances in Applied Probability, 40(4), 2003.
-
(2003)
Advances in Applied Probability
, vol.40
, Issue.4
-
-
Schroder, M.1
-
40
-
-
10644253941
-
A New Kind of Science
-
1st ed
-
S. Wolfram. “A New Kind of Science.” Wolfram Media, 1st ed, 2001.
-
(2001)
Wolfram Media
-
-
Wolfram, S.1
|