-
1
-
-
85032877753
-
Non-Interactive Oblivious Transfer and Application
-
Springer-Verlag
-
M. Bellare and S. Micali. Non-Interactive Oblivious Transfer and Application. In Crypto '89, LNCS 435, pages 547-557. Springer-Verlag, 1990.
-
(1990)
Crypto '89, LNCS 435
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
2
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
ACM Press
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In Proc. of the 20th STOC, pages 1-10. ACM Press, 1988.
-
(1988)
Proc. Of the 20Th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
84969361843
-
Practical Quantum Oblivious Transfer
-
Springer-Verlag
-
C.H. Bennett, G. Brassard, C. Crépeau, and M.-H. Skubiszewska. Practical Quantum Oblivious Transfer. In Crypto '91, LNCS 576, pages 351-366. Springer-Verlag, 1992.
-
(1992)
Crypto '91, LNCS 576
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, M.-H.4
-
4
-
-
0005275170
-
-
Technical Report CORR 98-19, University of Waterloo, Available at
-
S. Blackburn, S. Blake-Wilson, M. Burmester, and S. Galbraith. Shared Generation of Shared RSA Keys. Technical Report CORR 98-19, University of Waterloo, 1998. Available at http://www.cacr.math.uwaterloo.ca.
-
(1998)
Shared Generation of Shared RSA Keys
-
-
Blackburn, S.1
Blake-Wilson, S.2
Burmester, M.3
Galbraith, S.4
-
5
-
-
84958639277
-
Efficient Generation of Shared RSA Keys
-
Springer-Verlag
-
D. Boneh and M. Franklin. Efficient Generation of Shared RSA Keys. In Crypto '97, LNCS 1294, pages 425-439. Springer-Verlag, 1997.
-
(1997)
Crypto '97, LNCS 1294
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
0022864717
-
Information Theoretic Reductions among Disclosure Problems
-
IEEE
-
G. Brassard, C. Crépeau, and J-M. Robert. Information Theoretic Reductions among Disclosure Problems. In Proc. of the 27th FOCS, pages 168-173. IEEE, 1986.
-
(1986)
Proc. Of the 27Th FOCS
, pp. 168-173
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.-M.3
-
7
-
-
84888252697
-
All-or Nothing Disclosure of Secrets
-
Springer-Verlag
-
G. Brassard, C. Crépeau, and J-M. Robert. All-or Nothing Disclosure of Secrets. In Crypto '86, LNCS 263, pages 234-238. Springer-Verlag, 1987.
-
(1987)
Crypto '86, LNCS 263
, pp. 234-238
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.-M.3
-
8
-
-
84898947315
-
Multiparty Unconditionally Secure Protocols
-
ACM Press
-
D. Chaum, C. Crépeau, and I. Damgard. Multiparty Unconditionally Secure Protocols. In Proc. of the 20th STOC, pages 11-19. ACM Press, 1988.
-
(1988)
Proc. Of the 20Th STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgard, I.3
-
9
-
-
0024860209
-
A Zero-One Law for Boolean Privacy
-
ACM Press
-
B. Chor and E. Kushilevitz. A Zero-One Law for Boolean Privacy. In Proc. of the 21st STOC, pages 62-72. ACM Press, 1989.
-
(1989)
Proc. Of the 21St STOC
, pp. 62-72
-
-
Chor, B.1
Kushilevitz, E.2
-
12
-
-
0024132071
-
Achieving Oblivious Transfer Using Weakened Security Assumptions
-
IEEE
-
C. Crépeau and J. Kilian. Achieving Oblivious Transfer Using Weakened Security Assumptions. In Proc. of the 29th FOCS, pages 42-52. IEEE, 1988.
-
(1988)
Proc. Of the 29Th FOCS
, pp. 42-52
-
-
Crépeau, C.1
Kilian, J.2
-
13
-
-
84957649042
-
Commited Oblivious Transfer and Private Multy-Party Computation
-
Springer-Verlag
-
C. Crépeau, J. van de Graaf, and A. Tapp. Commited Oblivious Transfer and Private Multy-Party Computation. In Crypto '95, LNCS 963, pages 110-123. Springer-Verlag, 1995.
-
(1995)
Crypto '95, LNCS 963
, pp. 110-123
-
-
Crépeau, C.1
Van De Graaf, J.2
Tapp, A.3
-
17
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof Systems
-
february
-
S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM journal of computing, 18(1):186-208, february 1989.
-
(1989)
SIAM Journal of Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
18
-
-
84898989941
-
Founding Cryptography on Oblivious Transfer
-
ACM Press
-
J. Kilian. Founding Cryptography on Oblivious Transfer. In Proc. of the 20thSTOC, pages 20-31. ACM Press, 1988.
-
(1988)
Proc. Of the 20Th STOC
, pp. 20-31
-
-
Kilian, J.1
-
19
-
-
0032218237
-
A New Public Key Cryptosystem Based on Higher Residues
-
ACM press
-
D. Naccache and J. Stern. A New Public Key Cryptosystem Based on Higher Residues. In Proc. of the 5th CCCS. ACM press, 1998.
-
(1998)
Proc. Of the 5Th CCCS
-
-
Naccache, D.1
Stern, J.2
-
20
-
-
84927727752
-
Security Proofs for Signature Schemes
-
Springer-Verlag
-
D Pointcheval, and J Stern. Security Proofs for Signature Schemes. In Eurocrypt 96, LNCS 1070, pages 387-398. Springer-Verlag, 1996.
-
(1996)
Eurocrypt 96, LNCS 1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
22
-
-
84972540003
-
Approximate Formulas for some Functions of Prime Numbers
-
march
-
J.N. Rosser and L. Schoenfeld. Approximate Formulas for some Functions of Prime Numbers. Illinois Journal of Mathematics, 6(1):64-94, march 1962.
-
(1962)
Illinois Journal of Mathematics
, vol.6
, Issue.1
, pp. 64-94
-
-
Rosser, J.N.1
Schoenfeld, L.2
-
23
-
-
0003610767
-
A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems
-
K. Sakurai and H. Shizuya. A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems. Journal of Cryptology, 11(1):29-43, 1998.
-
(1998)
Journal of Cryptology
, vol.11
, Issue.1
, pp. 29-43
-
-
Sakurai, K.1
Shizuya, H.2
-
25
-
-
84947772655
-
A New and Efficient All-Or-Nothing Disclosure of Secrets Protocol
-
Springer-Verlag
-
J.P. Stern. A New and Efficient All-Or-Nothing Disclosure of Secrets Protocol. In Asiacrypt 98, LNCS. Springer-Verlag, 1998.
-
(1998)
Asiacrypt 98, LNCS
-
-
Stern, J.P.1
-
26
-
-
0022882770
-
How to Generate and Exchange Secrets
-
IEEE
-
A. C. Yao. How to Generate and Exchange Secrets. In Proc. of the 27th FOCS, pages 162-167. IEEE, 1986.
-
(1986)
Proc. Of the 27Th FOCS
, pp. 162-167
-
-
Yao, A.C.1
|