-
1
-
-
0031351741
-
A Concrete Security Treatment of Symmetric Encryption
-
M. Bellare, A. Desai, E. Jokipii, P. Rogaway: A Concrete Security Treatment of Symmetric Encryption, Proceedings of the 38th IEEE Symposium on Foundations of Computer Science (FOCS), pp. 394-403, 1997.
-
(1997)
Proceedings of the 38Th IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
3
-
-
84958626314
-
Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information
-
Springer-Verlag
-
R. Canetti: Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information, Crypto '97, Lecture Notes in Computer Science, Vol. 1294, Springer-Verlag, pp. 455-469, 1997.
-
(1997)
Crypto '97, Lecture Notes in Computer Science
, vol.1294
, pp. 455-469
-
-
Canetti, R.1
-
4
-
-
84958626761
-
Deniable Encryption
-
Springer-Verlag
-
R. Canetti, C. Dwork, M. Naor. R. Ostrovsky: Deniable Encryption, Crypto '97, Lecture Notes in Computer Science, Vol. 1294, Springer-Verlag, pp. 90-104, 1997.
-
(1997)
Crypto '97, Lecture Notes in Computer Science
, vol.1294
, pp. 90-104
-
-
Canetti, R.1
Dwork, C.2
Naor, M.3
Ostrovsky, R.4
-
5
-
-
0029723583
-
Adaptively Secure Multi-Party Computation
-
R. Canetti, U. Feige, O. Goldreich, M. Naor: Adaptively Secure Multi-Party Computation, Proceedings of the 28th Annual ACM Symposium on the Theory of Computing (STOC), pp. 639-648, 1996.
-
(1996)
Proceedings of the 28Th Annual ACM Symposium on the Theory of Computing (STOC)
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
10
-
-
0022793132
-
How to Construct Random Functions
-
S. Goldwasser, O. Goldreich, S. Micali: How to Construct Random Functions, Journal of ACM, vol. 33, pp. 792-807, 1986.
-
(1986)
Journal of ACM
, vol.33
, pp. 792-807
-
-
Goldwasser, S.1
Goldreich, O.2
Micali, S.3
-
14
-
-
33745533362
-
Construction of a Pseudorandom Generator from any One-Way Function
-
90
-
J. Hastad, R. Impagliazzo, L. Levin, M. Luby: Construction of a Pseudorandom Generator from any One-Way Function, to appear in SIAM Journal on Computing, preliminary versions in STOC'89 and STOC'90, 1989/90.
-
(1989)
To Appear in SIAM Journal on Computing, Preliminary Versions in STOC'89 and STOC'90
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
15
-
-
0023984964
-
How to Construct Pseudorandom Permutations from Pseudorandom Functions
-
M. Luby, C. Rackoff: How to Construct Pseudorandom Permutations from Pseudorandom Functions, SIAM Journal on Computing, Vol. 17, pp. 373-386, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
17
-
-
0001448484
-
Bit Commitment Using Pseudo-Randomness
-
M. Naor: Bit Commitment Using Pseudo-Randomness, Journal of Cryptology, vol. 4, pp. 151-158, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 151-158
-
-
Naor, M.1
-
20
-
-
0003064824
-
On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited
-
M. Naor, O. Reingold: On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited, Journal of Cryptology, vol. 12, no. 1, pp. 29-66, 1999.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.1
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
22
-
-
84974554584
-
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attacks
-
Springer-Verlag
-
C. Rackoff, D. Simon: Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attacks, Crypto '91, Lecture Notes in Computer Science, Vol. 576, Springer-Verlag, pp. 433-444, 1991.
-
(1991)
Crypto '91, Lecture Notes in Computer Science
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
|