-
3
-
-
84957657742
-
Many-to-one trapdoor functions and their relation to public-key cryptosystems
-
H. Krawczyk, editor, Springer-Verlag
-
M. Bellare, S. Halevi, A. Sahai, and S. Vadhan. Many-to-one trapdoor functions and their relation to public-key cryptosystems. In H. Krawczyk, editor, Advances in Cryptology-CRYPTO ’98, volume 1462 of Lecture Notes in Computer Science, pages 283-298. Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology-Crypto ’98, Volume 1462 of Lecture Notes in Computer Science
, pp. 283-298
-
-
Bellare, M.1
Halevi, S.2
Sahai, A.3
Vadhan, S.4
-
5
-
-
85030121757
-
Equivalence between two flavors of oblivious transfers
-
C. Crépeau. Equivalence between two flavors of oblivious transfers. In Proc. of CRYPTO ’87, pages 350-354, 1988.
-
(1988)
Proc. Of CRYPTO ’87
, pp. 350-354
-
-
Crépeau, C.1
-
9
-
-
0032201622
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proc. of the 36th Annu. IEEE Symp. on Foundations of Computer Science, pages 41-51, 1995. Journal version in JACM, Vol. 45(6), 1998, pp. 965-981.
-
(1998)
Proc. Of the 36Th Annu. IEEE Symp. On Foundations Of Computer Science, Pages 41-51, 1995. Journal Version in JACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
10
-
-
84957052653
-
Interactive hashing can simplify zero-knowledge protocol design without computational assumptions
-
D. R. Stinson, editor, Springer-Verlag
-
I. Damgard. Interactive hashing can simplify zero-knowledge protocol design without computational assumptions. In D. R. Stinson, editor, Advances in Cryptology-CRYPTO ’93, volume 773 of Lecture Notes in Computer Science. Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology-Crypto ’93, Volume 773 of Lecture Notes in Computer Science
-
-
Damgard, I.1
-
12
-
-
80051636706
-
Single-database private information retrieval implies oblivious transfer
-
Springer-Verlag, (this volume)
-
G. Di Crescenzo, T. Malkin, and R. Ostrovsky. Single-database private information retrieval implies oblivious transfer. In Advances in Cryptology-EUROCRYPT 2000, Lecture Notes in Computer Science, volume 1807, Springer-Verlag, 2000, pp. 122-139 (this volume).
-
(2000)
Advances in Cryptology-Eurocrypt 2000, Lecture Notes in Computer Science
, vol.1807
, pp. 122-139
-
-
Di Crescenzo, G.1
Malkin, T.2
Ostrovsky, R.3
-
14
-
-
84948968588
-
A note on one-prover, instance-hiding zero-knowledge proof systems
-
Springer, Berlin
-
J. Feigenbaum and R. Ostrovsky A note on one-prover, instance-hiding zero-knowledge proof systems In Advances in Cryptology-Asiacrypt’91, Lecture Notes in Computer Science, volume 739, Springer, Berlin, 1993, pp. 352-359.
-
(1993)
Advances in Cryptology-Asiacrypt’91, Lecture Notes in Computer Science
, vol.739
, pp. 352-359
-
-
Feigenbaum, J.1
Ostrovsky, R.2
-
15
-
-
84937574654
-
A random server model for private information retrieval
-
M. Luby, J. Rolim, and M. Serna, editors, Springer
-
Y. Gertner, S. Goldwasser, and T. Malkin. A random server model for private information retrieval. In M. Luby, J. Rolim, and M. Serna, editors, RANDOM ’98, 2nd International Workshop on Randomization and Approximation Techniques in Computer Science, volume 1518 of Lecture Notes in Computer Science, pages 200-217. Springer, 1998.
-
(1998)
RANDOM ’98, 2Nd International Workshop on Randomization and Approximation Techniques in Computer Science, Volume 1518 of Lecture Notes in Computer Science
, pp. 200-217
-
-
Gertner, Y.1
Goldwasser, S.2
Malkin, T.3
-
16
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin. Protecting data privacy in private information retrieval schemes. In Proc. of the 30th Annu. ACM Symp. on the Theory of Computing, pages 151-160, 1998.
-
(1998)
Proc. Of the 30Th Annu. ACM Symp. On the Theory Of Computing
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
17
-
-
33748209465
-
Foundations of Cryptography (Fragments of a book)
-
Electronic publication
-
O. Goldreich. Foundations of Cryptography (fragments of a book). Electronic Colloquium on Computational Complexity, 1995. Electronic publication: http://www.eccc.uni-trier.de/eccc-local/ECCC-Books/eccc-books.html.
-
(1995)
Electronic Colloquium on Computational Complexity
-
-
Goldreich, O.1
-
18
-
-
1542674248
-
Fault-tolerant computation in the full information model: The Two-party Case
-
O. Goldreich, S. Goldwasser, and N. Linial. Fault-tolerant computation in the full information model: the Two-party Case In Proc. of the 32nd Annu. IEEE Symp. on Foundations of Computer Science, pages 447-457, 1991. Journal Version in SIAM J. on Computing, Vol. 27(3), 1998, pp. 505-544.
-
(1998)
Proc. Of the 32Nd Annu. IEEE Symp. On Foundations Of Computer Science, Pages 447-457, 1991. Journal Version in SIAM J. On Computing
, vol.27
, Issue.3
, pp. 505-544
-
-
Goldreich, O.1
Goldwasser, S.2
Linial, N.3
-
21
-
-
33745533362
-
-
Technical Report TR-91-068, International Computer Science Institute
-
J. Hastad, R. Impagliazzo, L. A. Levin, and M. Luby. Construction of a pseudo-random generator from any one-way function. Technical Report TR-91-068, International Computer Science Institute, 1991.
-
(1991)
Construction of a Pseudo-Random Generator from Any One-Way Function
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
28
-
-
0003625461
-
-
Master’s thesis, Technion-Israel Institute of Technology, Haifa
-
E. Mann. Private access to distributed information. Master’s thesis, Technion-Israel Institute of Technology, Haifa, 1998.
-
(1998)
Private access to distributed information
-
-
Mann, E.1
-
29
-
-
0141544069
-
Perfect zero-knowledge arguments for NP can be based on general complexity assumptions
-
E. F. Brickell, editor
-
M. Naor, R. Ostrovsky, R. Venkatesan, and M. Yung. Perfect zero-knowledge arguments for NP can be based on general complexity assumptions. In E. F. Brickell, editor, Advances in Cryptology-CRYPTO ’92, volume 740 of Lecture Notes in Computer Science. Springer-Verlag, 1992. Final version in J. Cryptology, 11(2):87-108, 1998.
-
(1998)
Advances in Cryptology-Crypto ’92, Volume 740 of Lecture Notes in Computer Science. Springer-Verlag, 1992. Final Version in J. Cryptology
, vol.11
, Issue.2
, pp. 87-108
-
-
Naor, M.1
Ostrovsky, R.2
Venkatesan, R.3
Yung, M.4
-
33
-
-
1542660671
-
Fair games against an all-powerful adversary
-
Jin-Yi Cai, editor, AMS
-
R. Ostrovsky, R. Venkatesan, and M. Yung. Fair games against an all-powerful adversary. Presented at DIMACS Complexity and Cryptography workshop, October 1990, Princeton. Prelim. version in Proc. of the Sequences II workshop 1991, Springer-Verlag, pp. 418-429. Final version in AMS DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Vol. 13 Distributed Computing and Cryptography, Jin-Yi Cai, editor, pp. 155-169. AMS, 1993.
-
(1993)
Presented at DIMACS Complexity and Cryptography Workshop, October 1990, Princeton. Prelim. Version in Proc. Of the Sequences II Workshop 1991, Springer-Verlag, Pp. 418-429. Final Version in AMS DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Vol. 13 Distributed Computing and Cryptography
, pp. 155-169
-
-
Ostrovsky, R.1
Venkatesan, R.2
Yung, M.3
-
34
-
-
85028762469
-
Secure Commitment Against Powerful Adversary: A Security Primitive based on Average Intractability
-
(LNCS 577 Springer Verlag Ed. A. Finkel and M. Jantzen), February 13-15, Paris, France
-
R. Ostrovsky, R. Venkatesan, and M. Yung. Secure Commitment Against Powerful Adversary: A Security Primitive based on Average Intractability. In Proceedings of 9th Symposium on Theoretical Aspects of Computer Science (STACS-92) (LNCS 577 Springer Verlag Ed. A. Finkel and M. Jantzen) pp. 439-448 February 13-15 1992, Paris, France.
-
(1992)
Proceedings of 9Th Symposium on Theoretical Aspects of Computer Science (STACS-92)
, pp. 439-448
-
-
Ostrovsky, R.1
Venkatesan, R.2
Yung, M.3
-
39
-
-
22444454758
-
A new and efficient all-or-nothing disclosure of secrets protocol
-
J. P. Stern. A new and efficient all-or-nothing disclosure of secrets protocol. In ASIACRYPT ’98, 1998.
-
(1998)
ASIACRYPT ’98
-
-
Stern, J.P.1
|