메뉴 건너뛰기




Volumn 1807, Issue , 2000, Pages 453-469

Exposure-resilient functions and all-or-nothing transforms

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY;

EID: 84948973494     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45539-6_33     Document Type: Conference Paper
Times cited : (129)

References (26)
  • 1
    • 79958074367 scopus 로고    scopus 로고
    • A Forward-Secure Digital Signature Scheme
    • M. Bellare, S. Miner. A Forward-Secure Digital Signature Scheme. In Proc. Of Crypto, pp. 431-448, 1999.
    • (1999) In Proc. Of Crypto , pp. 431-448
    • Bellare, M.1    Miner, S.2
  • 4
    • 84957063575 scopus 로고    scopus 로고
    • On the Security Properties of the OAEP as an All-or-Nothing Transform
    • V. Boyko. On the Security Properties of the OAEP as an All-or-Nothing Transform. In Proc. of Crypto, pp. 503-518, 1999.
    • (1999) In Proc. Of Crypto , pp. 503-518
    • Boyko, V.1
  • 8
    • 84949000502 scopus 로고    scopus 로고
    • New Viruses Search For Strong Encryption Keys
    • March
    • A. Dornan. New Viruses Search For Strong Encryption Keys. In PlanetIT Systems Management News, March, 1999, http://www.planetit.com/techcenters/docs/systems_management/news/PIT19990317S0015.
    • (1999) In Planetit Systems Management News
    • Dornan, A.1
  • 10
    • 0025430107 scopus 로고
    • A Note on Computational Indistinguishability
    • O. Goldreich. A Note on Computational Indistinguishability. In IPL, 34: 277-281, 1990.
    • (1990) In IPL , vol.34 , pp. 277-281
    • Goldreich, O.1
  • 13
    • 0024866111 scopus 로고
    • Pseudorandom Generation from one-way functions
    • R. Impagliazzo, L. Levin, M. Luby. Pseudorandom Generation from one-way functions. In Proc. of STOC, pp. 12-24, 1989.
    • (1989) In Proc. Of STOC , pp. 12-24
    • Impagliazzo, R.1    Levin, L.2    Luby, M.3
  • 15
    • 0003946096 scopus 로고
    • Secret Sharing Made Short
    • H. Krawczyk. Secret Sharing Made Short. In Proc. of Crypto, pp. 136-146, 1993.
    • (1993) In Proc. Of Crypto , pp. 136-146
    • Krawczyk, H.1
  • 17
    • 0027641832 scopus 로고
    • Small-Bias Probability Spaces: Eçient Constructions and Applications
    • J. Naor, M. Naor. Small-Bias Probability Spaces: Eçient Constructions and Applications. In SIAM J. Computing, 22(4): 838-856, 1993.
    • (1993) In SIAM J. Computing , vol.22 , Issue.4 , pp. 838-856
    • Naor, J.1    Naor, M.2
  • 19
    • 84947912552 scopus 로고    scopus 로고
    • All-or-Nothing Encryption and the Package Transform
    • R. Rivest. All-or-Nothing Encryption and the Package Transform. In Fast Software Encryption, LNCS, 1267: 210-218, 1997.
    • (1997) In Fast Software Encryption, LNCS, 1267 , pp. 210-218
    • Rivest, R.1
  • 20
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. In Communic. of the ACM, 22: 612-613, 1979.
    • (1979) In Communic. Of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 24
    • 0041175120 scopus 로고
    • Computing with Very Weak Random Sources
    • A. Srinivasan, D. Zuckerman. Computing with Very Weak Random Sources. In Proc. of FOCS, pp. 264-275, 1994.
    • (1994) In Proc. Of FOCS , pp. 264-275
    • Srinivasan, A.1    Zuckerman, D.2
  • 26
    • 0032624550 scopus 로고    scopus 로고
    • Construction of Extractors Using PseudoRandom Generators
    • L. Trevisan. Construction of Extractors Using PseudoRandom Generators. In Proc. of STOC, pp. 141-148, 1999.
    • (1999) In Proc. Of STOC , pp. 141-148
    • Trevisan, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.