-
1
-
-
0003372190
-
The security of the cipher block chaining message authentication code
-
Springer-Verlag
-
M. Bellare, J. Kilian, and P. Rogaway, The security of the cipher block chaining message authentication code, Advances in Cryptology - CRYPTO '94, Lecture Notes in Computer Science, vol. 839, Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology - CRYPTO '94, Lecture Notes in Computer Science
, vol.839
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
2
-
-
84957051704
-
The security of the cipher block chaining message authentication code
-
Springer-Verlag
-
M. Bellare, J. Guérin, and P. Rogaway, The security of the cipher block chaining message authentication code, Advances in Cryptology - CRYPTO '95, Lecture Notes in Computer Science, vol. 963, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - CRYPTO '95, Lecture Notes in Computer Science
, vol.963
-
-
Bellare, M.1
Guérin, J.2
Rogaway, P.3
-
4
-
-
0026626314
-
Experimental quantum cryptography
-
Springer-Verlag
-
C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, Experimental quantum cryptography, Journal of Cryptology, vol. 5, no. 1, pp 3-28, Springer-Verlag, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
5
-
-
0029405656
-
Generalized privacy amplification
-
C.H. Bennett, G. Brassard, C. Crépeau, and U.M. Maurer, Generalized privacy amplification, IEEE Transactions on Information Theory, vol. 41, no. 6, pp 1915-1923, 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
6
-
-
0023985539
-
Privacy amplification by public discussion
-
C.H. Bennett, G. Brassard, and J.-M. Robert, Privacy amplification by public discussion, SIAM Journal on Computing, vol. 17, pp 210-229, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
8
-
-
84957360961
-
Oblivious transfer and privacy amplification
-
Springer-Verlag
-
G. Brassard and C. Crépeau, Oblivious transfer and privacy amplification, Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science, vol. 1233, pp 334-345, Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science
, vol.1233
, pp. 334-345
-
-
Brassard, G.1
Crépeau, C.2
-
9
-
-
0004013982
-
-
Ph. D. Thesis, ETH Zürich, Hartung-Gorre Verlag, Konstanz
-
C. Cachin, Entropy measures and unconditional security in cryptography, Ph. D. Thesis, ETH Zürich, Hartung-Gorre Verlag, Konstanz, 1997.
-
(1997)
Entropy Measures and Unconditional Security in Cryptography
-
-
Cachin, C.1
-
10
-
-
84957712978
-
On the foundation of oblivious transfer
-
Springer-Verlag
-
C. Cachin, On the foundation of oblivious transfer, Advances in Cryptology - EURO-CRYPT '98, Lecture Notes in Computer Science, vol. 1403, pp 361-374, Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology - EURO-CRYPT '98, Lecture Notes in Computer Science
, vol.1403
, pp. 361-374
-
-
Cachin, C.1
-
11
-
-
84958598231
-
Unconditional security against memory-bounded adversaries
-
Springer-Verlag
-
C. Cachin and U.M. Maurer, Unconditional security against memory-bounded adversaries, Advances in Cryptology - CRYPTO '97, Lecture Notes in Computer Science, vol. 1294, pp 292-306, Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology - CRYPTO '97, Lecture Notes in Computer Science
, vol.1294
, pp. 292-306
-
-
Cachin, C.1
Maurer, U.M.2
-
12
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crépeau, and I. Damgård, Multiparty unconditionally secure protocols, In Proc. 20th ACM Symposium on the Theory of Computing (STOC), pages 11-19, 1988.
-
(1988)
Proc. 20Th ACM Symposium on the Theory of Computing (STOC)
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
15
-
-
84957356475
-
Efficient cryptographic protocols based on noisy channels
-
Springer-Verlag
-
C. Crépeau, Efficient cryptographic protocols based on noisy channels, Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science, vol. 1233, pp 306-317, Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science
, vol.1233
, pp. 306-317
-
-
Crépeau, C.1
-
18
-
-
84957697395
-
On the (Im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
-
Springer-Verlag
-
I. Damgård, J. Kilian, and L. Salvail, On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions, Advances in Cryptology - EUROCRYPT '99, Lecture Notes in Computer Science, vol. 1592, pp 56-73, Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT '99, Lecture Notes in Computer Science
, vol.1592
, pp. 56-73
-
-
Damgård, I.1
Kilian, J.2
Salvail, L.3
-
19
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M.E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol. 22, no. 6, pp 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
20
-
-
84957611040
-
Lower bounds for oblivious transfer reductions
-
Springer-Verlag
-
Y. Dodis and S. Micali, Lower bounds for oblivious transfer reductions, Advances in Cryptology - EUROCRYPT '99, Lecture Notes in Computer Science, vol. 1592, pp 42-55, Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT '99, Lecture Notes in Computer Science
, vol.1592
, pp. 42-55
-
-
Dodis, Y.1
Micali, S.2
-
22
-
-
0008814479
-
Bounds on secret key exchange using a random deal of cards
-
Springer-Verlag
-
M. J. Fischer and R. N. Wright, Bounds on secret key exchange using a random deal of cards, Journal of Cryptology, vol. 9, no. 2, pp 71-99, Springer-Verlag, 1996.
-
(1996)
Journal of Cryptology
, vol.9
, Issue.2
, pp. 71-99
-
-
Fischer, M.J.1
Wright, R.N.2
-
23
-
-
85013455236
-
Codes for interactive authentication
-
Springer-Verlag
-
P. Gemmell and M. Naor, Codes for interactive authentication, Advances in Cryptology - CRYPTO '93, Lecture Notes in Computer Science, vol. 773, pp 355-367, Springer-Verlag, 1993.
-
(1993)
Advances in Cryptology - CRYPTO '93, Lecture Notes in Computer Science
, vol.773
, pp. 355-367
-
-
Gemmell, P.1
Naor, M.2
-
24
-
-
0016038540
-
Codes which detect deception
-
E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane, Codes which detect deception, Bell Syst. Tech. J., vol. 53, No. 3, 1974, pp 405-424.
-
(1974)
Bell Syst. Tech. J
, vol.53
, Issue.3
, pp. 405-424
-
-
Gilbert, E.N.1
Macwilliams, F.J.2
Sloane, N.J.3
-
25
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali, How to construct random functions, Journal of the ACM, vol. 33, no. 4, pp 210-217, 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
27
-
-
33745533362
-
Construction of a pseudorandom generator from any one-way function
-
ICSI, Berkeley, CA
-
J. H_astad, R. Impagliazzo, L. Levin, and M. Luby, Construction of a pseudorandom generator from any one-way function, Technical Report no. 91-068, ICSI, Berkeley, CA, 1991.
-
(1991)
Technical Report
, vol.91
-
-
H_Astad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
28
-
-
84976699318
-
The Byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease, The Byzantine generals problem, ACM Transactions on Programming Languages and Systems, vol. 4, pp 382-401, 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
29
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
M. Luby and C. Racko_, How to construct pseudorandom permutations from pseudorandom functions, SIAM Journal on Computing, vol. 17, no. 2, pp 373-386, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Racko_, C.2
-
30
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
Springer-Verlag
-
U. M. Maurer, Conditionally-perfect secrecy and a provably-secure randomized cipher, Journal of Cryptology, vol. 5, pp. 53-66, Springer-Verlag, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, pp. 53-66
-
-
Maurer, U.M.1
-
31
-
-
85048564026
-
And generalized treatment of Luby-Rackoff pseudo-random permutation generators
-
Springer-Verlag
-
U. M. Maurer, A simplified and generalized treatment of Luby-Rackoff pseudo-random permutation generators, Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, pp 239-255, Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science
, vol.658
, pp. 239-255
-
-
Maurer, U.M.1
Simplified, A.2
-
32
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer, Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, vol. 39, no. 3, pp 733-742, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
33
-
-
84938858421
-
A unified and generalized treatment of authentication theory
-
Springer-Verlag
-
U. M. Maurer, A unified and generalized treatment of authentication theory, Proceedings 13th Symp. on Theoretical Aspects of Computer Science - STACS '96, Lecture Notes in Computer Science, vol. 1046, pp 387-398, Springer-Verlag, 1996.
-
(1996)
Proceedings 13Th Symp. On Theoretical Aspects of Computer Science - STACS '96, Lecture Notes in Computer Science
, vol.1046
, pp. 387-398
-
-
Maurer, U.M.1
-
34
-
-
77951458752
-
Information-theoretically secure secret-key agreement by NOT authenticated public discussion
-
Springer-Verlag
-
U. M. Maurer, Information-theoretically secure secret-key agreement by NOT authenticated public discussion, Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science, vol. 1233, pp 209-225, Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science
, vol.1233
, pp. 209-225
-
-
Maurer, U.M.1
-
35
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
U. M. Maurer and S. Wolf, Unconditionally secure key agreement and the intrinsic conditional information, IEEE Transactions on Information Theory, vol. 45, no. 2, pp 499-514, 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
36
-
-
0003064824
-
On the construction of pseudorandom permutations: Luby-Rackoff revisited
-
M. Naor and O. Reingold, On the construction of pseudorandom permutations: Luby-Rackoff revisited, Journal of Cryptology, vol. 12, no. 1, pp 29-66, 1999.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.1
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
39
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, vol. 28, pp 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
40
-
-
84940644968
-
A mathematical theory of communication
-
C. E. Shannon, A mathematical theory of communication, Bell System Technical Journal, vol. 27, pp 379-423 and 623-656, 1948.
-
(1948)
Bell System Technical Journal
, vol.27
-
-
Shannon, C.E.1
-
41
-
-
0024015453
-
A survey of information authentication
-
G. J. Simmons, A survey of information authentication, Proceedings of the IEEE, vol. 76, pp 603-620, 1988.
-
(1988)
Proceedings of the IEEE
, vol.76
, pp. 603-620
-
-
Simmons, G.J.1
-
42
-
-
71049183202
-
Universal hashing and authentication codes
-
Springer-Verlag
-
D. R. Stinson, Universal hashing and authentication codes, Advances in Cryptology - CRYPTO '91, Lecture Notes in Computer Science, vol. 576, pp 74-85, Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology - CRYPTO '91, Lecture Notes in Computer Science
, vol.576
, pp. 74-85
-
-
Stinson, D.R.1
-
43
-
-
0000478763
-
Cipher printing telegraph systems for secret wire and radio telegraphic communications
-
G. S. Vernam, Cipher printing telegraph systems for secret wire and radio telegraphic communications, Journal of the American Institute for Electrical Engineers, vol. 55, pp 109-115, 1926.
-
(1926)
Journal of the American Institute for Electrical Engineers
, vol.55
, pp. 109-115
-
-
Vernam, G.S.1
-
44
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and J. L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, vol. 22, pp 265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
-
45
-
-
84947780088
-
Strong security against active attacks in information-theoretic secret-key agreement
-
Springer-Verlag
-
S. Wolf, Strong security against active attacks in information-theoretic secret-key agreement, Advances in Cryptology - ASIACRYPT '98, Lecture Notes in Computer Science, vol. 1514, pp 405-419, Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology - ASIACRYPT '98, Lecture Notes in Computer Science
, vol.1514
, pp. 405-419
-
-
Wolf, S.1
-
46
-
-
30444442452
-
Unconditional security in cryptography
-
July 1998, Aarhus, Denmark, Lecture Notes in Computer Science, Springer-Verlag
-
S. Wolf, Unconditional security in cryptography, Proceedings of Summer School in Cryptology and Data Security, July 1998, Aarhus, Denmark, Lecture Notes in Computer Science, vol. 1561, pp 217-250, Springer-Verlag, 1999.
-
(1999)
Proceedings of Summer School in Cryptology and Data Security
, vol.1561
, pp. 217-250
-
-
Wolf, S.1
-
48
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, The wire-tap channel, Bell System Technical Journal, vol. 54, no. 8, pp 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
|