-
1
-
-
0025535378
-
Simple constructions of almost k-wise independent random variables
-
St. Louis, Missouri, 22–24 October, IEEE
-
Noga Alon, Oded Goldreich, Johan Hastad, and Rene Peralta. Simple constructions of almost k-wise independent random variables. In 31st Annual Symposium on Foundations of Computer Science, volume II, pages 544–553, St. Louis, Missouri, 22–24 October 1990. IEEE.
-
(1990)
31St Annual Symposium on Foundations of Computer Science
, vol.2
, pp. 544-553
-
-
Alon, N.1
Goldreich, O.2
Hastad, J.3
Peralta, R.4
-
2
-
-
84957084138
-
Information theoretically secure communication in the limited storage space model
-
Springer-Verlag
-
Yonatan Aumann and Michael O. Rabin. Information theoretically secure communication in the limited storage space model. In Michael Wiener, editor, Advances in Cryptology – CRYPTO ’99, volume 1666 of Lecture Notes in Computer Science, pages 65–79. Springer-Verlag, 1999.
-
(1999)
Michael Wiener, Editor, Advances in Cryptology – CRYPTO ’99, Volume 1666 of Lecture Notes in Computer Science
, pp. 65-79
-
-
Aumann, Y.1
Rabin, M.O.2
-
3
-
-
0003466442
-
-
MIT Press, Cambridge, MA, Efficient algorithms
-
Eric Bach and Jeffrey Shallit. Algorithmic number theory. Vol. 1. MIT Press, Cambridge, MA, 1996. Efficient algorithms.
-
(1996)
Algorithmic Number Theory
, vol.1
-
-
Bach, E.1
Shallit, J.2
-
4
-
-
84947233548
-
-
Krawczyk
-
M. Bellare, A. Desai, A. Pointcheval, and P. Rogaway. Relations among notions of public-key cryptosystems. In Krawczyk [13], page 540.
-
Relations among Notions of Public-Key Cryptosystems
, Issue.13
, pp. 540
-
-
Bellare, M.1
Desai, A.2
Pointcheval, A.3
Rogaway, P.4
-
5
-
-
84948986458
-
Optimal asymmetric encryption
-
Springer-Verlag1995, 9–12 May
-
Mihir Bellare and Phillip Rogaway. Optimal asymmetric encryption. In Alfredo De Santis, editor, Advances in Cryptology – EUROCRYPT 94, volume 950 of Lecture Notes in Computer Science, pages 92–111. Springer-Verlag, 1995, 9–12 May 1994.
-
(1994)
Alfredo De Santis, Editor, Advances in Cryptology – EUROCRYPT 94, Volume 950 of Lecture Notes in Computer Science
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84949995981
-
An efficient probabilistic public-key encryption scheme which hides all partial information
-
G. R. Blakley and David Chaum, editors, Springer-Verlag, 1985, 19–22August
-
Manuel Blum and Shafi Goldwasser. An efficient probabilistic public-key encryption scheme which hides all partial information. In G. R. Blakley and David Chaum, editors, Advances in Cryptology: Proceedings of CRYPTO 84, volume 196 of Lecture Notes in Computer Science, pages 289–299. Springer-Verlag, 1985, 19–22 August 1984.
-
(1984)
Advances in Cryptology: Proceedings of CRYPTO 84, Volume 196 of Lecture Notes in Computer Science
, pp. 289-299
-
-
Blum, M.1
Goldwasser, S.2
-
7
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
November
-
Manuel Blum and Silvio Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850–864, November 1984.
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
9
-
-
85028450627
-
Non-malleable cryptography (Extended abstract)
-
New Orleans, Louisiana, 6–8 May
-
Danny Dolev, Cynthia Dwork, and Moni Naor. Non-malleable cryptography (extended abstract). In Proceedings of the Twenty Third Annual ACM Symposium on Theory of Computing, pages 542–552, New Orleans, Louisiana, 6–8 May 1991.
-
(1991)
Proceedings of the Twenty Third Annual ACM Symposium on Theory of Computing
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
10
-
-
0027306732
-
A uniform-complexity treatment of encryption and zeroknowledge
-
Oded Goldreich. A uniform-complexity treatment of encryption and zeroknowledge. Journal of Cryptology, 6(1):21–53, 1993.
-
(1993)
Journal of Cryptology
, vol.6
, Issue.1
, pp. 21-53
-
-
Goldreich, O.1
-
12
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April1
-
Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281–308, April1 988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
15
-
-
0026698501
-
Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher
-
Ueli M. Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53–66, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Ueli, M.1
-
16
-
-
0027641832
-
Small-bias probability spaces: Efficient constructions and applications
-
Joseph Naor and Moni Naor. Small-bias probability spaces: Efficient constructions and applications. SIAM Journal on Computing, 22(4):838–856, August 1993.
-
(1993)
SIAM Journal on Computing
, vol.22
, Issue.4
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
18
-
-
84968503946
-
On the distribution of quadratic residues and nonresidues modulo a prime number
-
Rene Peralta. On the distribution of quadratic residues and nonresidues modulo a prime number. Mathematics of Computation, 58(197):433–440, 1992.
-
(1992)
Mathematics of Computation
, vol.58
, Issue.197
, pp. 433-440
-
-
Peralta, R.1
-
19
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
J. Feigenbaum, editor, Springer-Verlag, 1992, 11–15 August
-
Charles Rackoff and Daniel R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In J. Feigenbaum, editor, Advances in Cryptology – CRYPTO ’91, volume 576 of Lecture Notes in Computer Science, pages 433–444. Springer-Verlag, 1992, 11–15 August 1991.
-
(1991)
Advances in Cryptology – CRYPTO ’91, Volume 576 of Lecture Notes in Computer Science
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
21
-
-
0015197550
-
Schnelle berechnung von kettenbruchentwicklungen
-
A. Schonhage. Schnelle berechnung von kettenbruchentwicklungen. Acta Informatica, 1:139–144, 1971.
-
(1971)
Acta Informatica
, vol.1
, pp. 139-144
-
-
Schonhage, A.1
-
22
-
-
0000256895
-
Schnelle Multiplikation von Polynomen uber Korpern der Charakteristik 2
-
77
-
A. Schonhage. Schnelle Multiplikation von Polynomen uber Korpern der Charakteristik 2. Acta Informat., 7(4):395–398, 1976/77.
-
(1976)
Acta Informat
, vol.7
, Issue.4
, pp. 395-398
-
-
Schonhage, A.1
-
23
-
-
34250459760
-
Schnelle multiplikation großer zahlen
-
A. Schonhage and V. Strassen. Schnelle multiplikation großer zahlen. Computing, 7:281–292, 1971.
-
(1971)
Computing
, vol.7
, pp. 281-292
-
-
Schonhage, A.1
Strassen, V.2
-
24
-
-
0018735887
-
New classes and applications of hash functions
-
San Juan, Puerto Rico, 29–31 October, IEEE
-
Mark N. Wegman and J. Lawrence Carter. New classes and applications of hash functions. In 20th Annual Symposium on Foundations of Computer Science, pages 175–182, San Juan, Puerto Rico, 29–31 October 1979. IEEE.
-
(1979)
20Th Annual Symposium on Foundations of Computer Science
, pp. 175-182
-
-
Wegman, M.N.1
Lawrence Carter, J.2
-
25
-
-
0004024422
-
-
The Clarendon Press Oxford University Press, New York
-
Dominic Welsh. Codes and cryptography. The Clarendon Press Oxford University Press, New York, 1988.
-
(1988)
Codes and Cryptography
-
-
Welsh, D.1
|