-
1
-
-
0029405656
-
Generalized Privacy Amplification
-
C.H. Bennett, G. Brassard, C. Crepeau, and U.M. Maurer. Generalized Privacy Amplification. IEEE Transaction on Information Theory, Volume 41, Number 6, November 1995, pp. 1915-1923.
-
(1995)
IEEE Transaction on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.M.4
-
2
-
-
84969361843
-
Practical quantum oblivious transfer
-
Springer-Verlag
-
C.H. Bennett, G. Brassard, C. Crepeau, and M.-H. Skubiszewska. Practical quantum oblivious transfer. In Advances in Cryptology: Proceedings of Crypto’91, Lecture Notes in Computer Science, Vol. 576, pages 351-366. Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology: Proceedings of Crypto’91, Lecture Notes in Computer Science
, vol.576
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Skubiszewska, M.-H.4
-
5
-
-
0027803208
-
A quantum bit commitment scheme provably unbreakable by both parties
-
G. Brassard, C. Crepeau, R. Jozsa and D. Langlois, “A quantum bit commitment scheme provably unbreakable by both parties,” Proceedings of 34th IEEE Symposium on Foundations of Computer Science, 1993, pp. 362-371.
-
(1993)
Proceedings of 34Th IEEE Symposium on Foundations of Computer Science
, pp. 362-371
-
-
Brassard, G.1
Crepeau, C.2
Jozsa, R.3
Langlois, D.4
-
7
-
-
85030121757
-
Equivalence between two flavours of oblivious transfers (Abstract)
-
C. Pomerance, editor, Springer-Verlag
-
C. Crepeau. Equivalence between two flavours of oblivious transfers (abstract). In C. Pomerance, editor, Advances in Cryptology: Proceedings of Crypto’87, pages 350-354, Springer-Verlag, 1988.
-
(1988)
Advances in Cryptology: Proceedings of Crypto’87
, pp. 350-354
-
-
Crepeau, C.1
-
10
-
-
0020878801
-
A randomized protocol for signing contracts
-
In R. L. Rivest, A. Sherman, and D. Chaum, editors, Plenum Press, New v'ork
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. In R. L. Rivest, A. Sherman, and D. Chaum, editors, Proceedings CRYPTO 82, pages 205-210, Plenum Press, New v'ork, 1983.
-
(1983)
Proceedings CRYPTO 82
, pp. 205-210
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
12
-
-
0023545076
-
How to play any mental game, or: A completeness theorem for protocols with honest majority
-
ACM
-
O. Goldreich, S. Micali and A. Wigderson, How to play any mental game, or: A completeness theorem for protocols with honest majority In Proc. 19th ACM Symposium on Theory of Computing, pages 218-229, ACM, 1987.
-
(1987)
Proc. 19Th ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
13
-
-
71149116146
-
Proofs that yield nothing but their validity, or All languages in A'V have zero-knowledge proof systems
-
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity, or All languages in A'V have zero-knowledge proof systems. Journal of the ACM, 38:691-729, 1991.
-
(1991)
Journal of the ACM
, vol.38
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
18
-
-
0001998264
-
Conjugate coding
-
Manuscript written circa 1970, unpublished until it appeared in SIGACT News
-
S. Wiesner. Conjugate coding. SIGACT News, 15(1):78-88, 1983. Manuscript written circa 1970, unpublished until it appeared in SIGACT News.
-
(1983)
SIGACT News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
-
19
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, “The wire-tap channel”, Bell System Technical Journal, Vol. 54, no. 8, 1975, pp. 1355-1387.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
|