-
1
-
-
0041089975
-
On hiding information from an oracle
-
Abadi, M., J. Feigenbaum, and J. Kilian, “On hiding information from an oracle”, Journal of Computer and System Sciences, Vol. 39, 1989, pp. 21-50.
-
(1989)
Journal of Computer and System Sciences
, vol.39
, pp. 21-50
-
-
Abadi, M.1
Feigenbaum, J.2
Kilian, J.3
-
2
-
-
0011208228
-
Provable security of cryptosystems: A survey
-
Department of Computer Science, Yale University
-
Angluin, D. and D. Lichtenstein, “Provable security of cryptosystems: A survey”, Technical Report YALEU/DCS/TR-288, Department of Computer Science, Yale University, 1983.
-
(1983)
Technical Report YALEU/DCS/TR-288
-
-
Angluin, D.1
Lichtenstein, D.2
-
3
-
-
0025065889
-
Perfect zero-knowledge in constant rounds
-
Bellare, M., S. Micali, and R. Ostrovsky, “Perfect zero-knowledge in constant rounds”, Proceedings of the 22nd ACM Symposium on Theory of Computing, 1990, pp. 482-493.
-
(1990)
Proceedings of the 22nd ACM Symposium on Theory of Computing
, pp. 482-493
-
-
Bellare, M.1
Micali, S.2
Ostrovsky, R.3
-
4
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India, December
-
Bennett, C.H. and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, December 1984, pp. 175-179.
-
(1984)
Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
6
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Blum, M. and S. Micali, “How to generate cryptographically strong sequences of pseudo-random bits”, SIAM Journal on Computing, Vol. 13, 1984, pp. 850-864.
-
(1984)
SIAM Journal on Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
7
-
-
0025056443
-
A discrete logarithm implementation of zero-knowledge blobs
-
Boyar, J. F., M. W. Krentel, and S. A. Kurtz, “A discrete logarithm implementation of zero-knowledge blobs”, Journal of Cryptology, Vol. 2, no. 2, 1990.
-
(1990)
Journal of Cryptology
, vol.2
, Issue.2
-
-
Boyar, J.F.1
Krentel, M.W.2
Kurtz, S.A.3
-
8
-
-
85030321338
-
Cryptology column - Bit commitment schemes
-
Preparation
-
Brassard, G., “Cryptology column - Bit commitment schemes”, Sigact News, in preparation, 1991.
-
(1991)
Sigact News
-
-
Brassard, G.1
-
9
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
Brassard, G., D. Chaum, and C. Crépeau, “Minimum disclosure proofs of knowledge”, Journal of Computer and System Sciences, Vol. 37, no. 2, 1988, pp. 156-189.
-
(1988)
Journal of Computer and System Sciences
, vol.37
, Issue.2
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crépeau, C.3
-
13
-
-
84957656166
-
Everything in NP can be argued in perfect zero-knowledge in a bounded number of rounds
-
Springer-Verlag, Final paper to appear in Theoretical Computer Science under the title of “Constant-round perfect zero-knowledge computationally convincing protocols”
-
Brassard, G., C. Crépeau, and M. Yung, “Everything in NP can be argued in perfect zero-knowledge in a bounded number of rounds”, Proceedings of the 16th International Colloquium on Automata, Languages and Programming, Springer-Verlag, 1989, pp. 123-136. Final paper to appear in Theoretical Computer Science under the title of “Constant-round perfect zero-knowledge computationally convincing protocols”.
-
(1989)
Proceedings of the 16th International Colloquium on Automata, Languages and Programming
, pp. 123-136
-
-
Brassard, G.1
Crépeau, C.2
Yung, M.3
-
14
-
-
85030326654
-
A meta zero-knowledge scheme
-
University of Leeds, July, Submitted for journal publication
-
Burmester, M.V. D., Y. G. Desmedt, F. Piper, and M. Walker, “A meta zero-knowledge scheme”, Proceedings of C089 Combinatorial Optimization Conference, University of Leeds, July 1989. Submitted for journal publication.
-
(1989)
Proceedings of C089 Combinatorial Optimization Conference
-
-
Burmester, M.V.D.1
Desmedt, Y.G.2
Piper, F.3
Walker, M.4
-
15
-
-
84976713185
-
Demonstrating that a public predicate can be satisfied without revealing any information about how
-
Springer-Verlag
-
Chaum, D., “Demonstrating that a public predicate can be satisfied without revealing any information about how”, Advances in Cryptology: CRYPTO '86 Proceedings, Springer-Verlag, 1987, pp. 195-199.
-
(1987)
Advances in Cryptology: CRYPTO '86 Proceedings
, pp. 195-199
-
-
Chaum, D.1
-
16
-
-
84864708144
-
Multiparty computations ensuring privacy of each party’s input and correctness of the result
-
Springer-Verlag
-
Chaum, D., I. B. Damgård, and J. van de Graaf, “Multiparty computations ensuring privacy of each party’s input and correctness of the result”, Advances in Cryptology: CRYPTO '87 Proceedings, Springer-Verlag, 1988, pp. 87-119.
-
(1988)
Advances in Cryptology: CRYPTO '87 Proceedings
, pp. 87-119
-
-
Chaum, D.1
Damgård, I.B.2
van de Graaf, J.3
-
19
-
-
0022914590
-
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
-
Goldreich, O., S. Micali, and A. Wigderson, “Proofs that yield nothing but their validity and a methodology of cryptographic protocol design”, Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, 1986, pp. 174-187.
-
(1986)
Proceedings of the 27th IEEE Symposium on Foundations of Computer Science
, pp. 174-187
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
20
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Goldwasser, S., S. Micali, and C. Rackoff, “The knowledge complexity of interactive proof systems”, SIAM Journal on Computing, Vol. 18, no. 1, 1989, pp. 186-208.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
21
-
-
0023985465
-
A secure digital signature scheme
-
Goldwasser, S., S. Micali, and R. Rivest, “A secure digital signature scheme”, SIAM Journal on Computing, Vol. 17, no. 2, 1988, pp. 281-308.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
23
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
Impagliazzo, R., L. Levin, and M. Luby, “Pseudo-random generation from one-way functions”, Proceedings of the 21st ACM Symposium on Theory of Computing, 1989, pp. 12-24.
-
(1989)
Proceedings of the 21st ACM Symposium on Theory of Computing
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.2
Luby, M.3
-
28
-
-
85030314001
-
Fast generation of secure RSA-moduli with almost maximal diversity
-
SpringerVerlag, to appear
-
Maurer, U.M., “Fast generation of secure RSA-moduli with almost maximal diversity”, Advances in Cryptology: EUROCRYPT '89 Proceedings, SpringerVerlag, to appear.
-
Advances in Cryptology: EUROCRYPT '89 Proceedings
-
-
Maurer, U.M.1
-
29
-
-
79551478054
-
Bit commitment using pseudo-randomness
-
Springer-Verlag
-
Naor, M., “Bit commitment using pseudo-randomness”, Advances in Cryptology: CRYPTO '89 Proceedings, Springer-Verlag, 1990, pp. 128-136.
-
(1990)
Advances in Cryptology: CRYPTO '89 Proceedings
, pp. 128-136
-
-
Naor, M.1
-
30
-
-
85030326964
-
-
manuscript
-
Naor, M., R. Ostrovsky, R. Venkatesan, and M. Yung, manuscript, 1990.
-
(1990)
-
-
Naor, M.1
Ostrovsky, R.2
Venkatesan, R.3
Yung, M.4
-
32
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
Pohlig, S. and M.E. Heilman, “An improved algorithm for computing logarithms over GF(p) and its cryptographic significance”, IEEE Transactions on Information Theory, Vol. IT-24, 1978, pp. 106-110.
-
(1978)
IEEE Transactions on Information Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.1
Heilman, M.E.2
-
33
-
-
85030312004
-
A group-theoretic interface to random self-reducibility
-
July 25
-
Shizuya, H. and T. Itoh, “A group-theoretic interface to random self-reducibility”, Transactions of the Institute of Electronics, Information and Communication Engineers (IEICE) of Japan, Section E, Vol. E73, no. 7, July 25, 1990.
-
(1990)
Transactions of the Institute of Electronics, Information and Communication Engineers (IEICE) of Japan, Section E
, vol.E73
, Issue.7
-
-
Shizuya, H.1
Itoh, T.2
|