-
2
-
-
84976804419
-
How to Exchange (Secret) Keys
-
May
-
M. Blum. How to Exchange (Secret) Keys. In ACM Transactions of Computer Systems, vol. 1, No. 2, pp. 175-193, May 1983.
-
(1983)
ACM Transactions of Computer Systems
, vol.1
, Issue.2
, pp. 175-193
-
-
Blum, M.1
-
5
-
-
0030283655
-
Oblivious Transfers and Intersecting Codes
-
G. Brassard, C. Cr_epeau, M. S_antha. Oblivious Transfers and Intersecting Codes. In IEEE Transaction on Information Theory, special issue in coding and com- plexity, Volume 42, Number 6, pp. 1769-1780, 1996.
-
(1996)
IEEE Transaction on Information Theory, Special Issue in Coding and Com- Plexity
, vol.42
, Issue.6
, pp. 1769-1780
-
-
Brassard, G.1
Cr_Epeau, C.2
S_Antha, M.3
-
7
-
-
84945299518
-
A zero-knowledge poker protocol that achieves confidentiality of the players' strategy or how to achieve an electronic poker face
-
Springer-Verlag
-
C. Cr_epeau. A zero-knowledge poker protocol that achieves confidentiality of the players' strategy or how to achieve an electronic poker face. In Advances in Cryptology: Proceedings of Crypto '86, pp. 239-247. Springer-Verlag, 1987.
-
(1987)
Advances in Cryptology: Proceedings of Crypto '86
, pp. 239-247
-
-
Cr_Epeau, C.1
-
9
-
-
0020878801
-
A Randomized Protocol for Signing Contracts
-
Plenum Press, New York
-
S. Even, O. Goldreich, A. Lempel. A Randomized Protocol for Signing Contracts. In Advances of Cryptology: Proceedings of Crypto '83, Plenum Press, New York, pp. 205-210, 1983.
-
(1983)
Advances of Cryptology: Proceedings of Crypto '83
, pp. 205-210
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
10
-
-
0004809522
-
A Secure Protocol for the Oblivious Transfer
-
M. Fisher, S. Micali, C. Racko_. A Secure Protocol for the Oblivious Transfer. In Journal of Cryptology, vol. 9, No. 3 pp. 191-195, 1996.
-
(1996)
Journal of Cryptology
, vol.9
, Issue.3
, pp. 191-195
-
-
Fisher, M.1
Micali, S.2
Racko_, C.3
-
11
-
-
0023545076
-
How to play any mental game, or: A completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, A. Wigderson. How to play any mental game, or: A completeness theorem for protocols with honest majority. In Proceedings of 19th Annual Symp. on Theory of Computing, 218-229, 1987.
-
(1987)
Proceedings of 19Th Annual Symp. on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
16
-
-
0026237211
-
Secret ballot elections in computer networks
-
H. Nurmi, A. Salomaa, L. Santean. Secret ballot elections in computer networks. In Computer and Security, volume 10, No. 6, pp. 553-560, 1991.
-
(1991)
Computer and Security
, vol.10
, Issue.6
, pp. 553-560
-
-
Nurmi, H.1
Salomaa, A.2
Santean, L.3
-
17
-
-
0003462641
-
How to Exchange Secrets by Oblivious Transfer
-
Aiken Computation Laboratory, Harvard University
-
M. Rabin. How to Exchange Secrets by Oblivious Transfer. In Technical Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981.
-
(1981)
Technical Memo TR-81
-
-
Rabin, M.1
|