-
1
-
-
0041937636
-
An efficient probabilistic public-key encryption scheme which hides all partial information
-
M. Blum and S. Goldwassei, "An efficient probabilistic public-key encryption scheme which hides all partial information", CRYPTO 84
-
CRYPTO 84
-
-
Blum, M.1
Goldwassei, S.2
-
2
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
-
M. Blum, and S. Micali "How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits", FOCS 82 and SIAM J. on Computing, Vol 13, 1984, pp. 850-864.
-
(1984)
FOCS 82 and SIAM J. on Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
3
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
M. Ben-or, S. Goldwasser, and A. Wigderson, "Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation", STOC 88.
-
STOC 88
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Communication of the ACM, vol. 24, no. 2 (1981), pp. 84-88.
-
(1981)
Communication of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
8
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
-
D. Chaum, "The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability", Journal of Cryptology, vol. 1 (1988), pp. 65-75.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
9
-
-
0027005999
-
Achieving Electronic Privacy
-
D. Chaum, "Achieving Electronic Privacy", Scientific American, vol. 267, no. 2 (1992), pp. 96-101.
-
(1992)
Scientific American
, vol.267
, Issue.2
, pp. 96-101
-
-
Chaum, D.1
-
10
-
-
0027805770
-
Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems
-
M. Franklin, Z. Galil and M. Yung "Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems," FOCS 93.
-
FOCS 93
-
-
Franklin, M.1
Galil, Z.2
Yung, M.3
-
12
-
-
84969331532
-
Pseudo-Random Generators under Uniform Assumptions
-
J. Hastad, "Pseudo-Random Generators under Uniform Assumptions", STOC 90.
-
STOC 90
-
-
Hastad, J.1
-
14
-
-
0038647741
-
Reducibility and Completeness in Multi-Party Private Computations
-
E. Kushilevitz, S. Micali, and R. Ostrovsky, "Reducibility and Completeness in Multi-Party Private Computations", FOCS 94.
-
FOCS 94
-
-
Kushilevitz, E.1
Micali, S.2
Ostrovsky, R.3
-
19
-
-
6244294214
-
The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability
-
M. Waidner and B. Pfitzmann, "The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability Eurocrypt 89.
-
Eurocrypt 89
-
-
Waidner, M.1
Pfitzmann, B.2
-
20
-
-
0027224328
-
Cryptographic Defense Against Traffic Analysis
-
C. Rackoff and D. Simon, "Cryptographic Defense Against Traffic Analysis", STOC 93
-
STOC 93
-
-
Rackoff, C.1
Simon, D.2
|