-
1
-
-
0023985539
-
Privacy Amplification by Public Discussion
-
C.H. Bennett, G. Brassard, J.-M. Robert, Privacy Amplification by Public Discussion, SIAM Journal on Computing, Vol. 17, No.2, 1988, pp. 210-229.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
2
-
-
84969361843
-
Practical Quantum Oblivious Transfer
-
Springer-Verlag
-
C.H. Bennett, G. Brassard, C. Crépeau, M.-H. Skubiszewska, Practical Quantum Oblivious Transfer, Advances in Cryptology - CRYPTO'91, Springer-Verlag, 1992, pp. 351-366.
-
(1992)
Advances in Cryptology - CRYPTO'91
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, M.-H.4
-
3
-
-
0027803208
-
A Quantum Bit Commitment Scheme Provably Unbreakable by both Parties
-
G. Brassard, C. Crépeau, R. Jozsa, D. Langlois, A Quantum Bit Commitment Scheme Provably Unbreakable by both Parties, 34th IEEE Symposium on Foundation of Computer Science, 1993, pp. 362-371.
-
(1993)
34th IEEE Symposium on Foundation of Computer Science
, pp. 362-371
-
-
Brassard, G.1
Crépeau, C.2
Jozsa, R.3
Langlois, D.4
-
5
-
-
84864708144
-
Multiparty computations ensuring privacy of each party's input and correctness of the result
-
Springer-Verlag
-
D. Chaum, I. Damgård and J. van de Graaf, Multiparty computations ensuring privacy of each party's input and correctness of the result, Advances in Cryptology - CRYPTO'87, Springer-Verlag, 1988, pp. 87-119.
-
(1988)
Advances in Cryptology - CRYPTO'87
, pp. 87-119
-
-
Chaum, D.1
Damgård, I.2
van de Graaf, J.3
-
6
-
-
85032862578
-
Controlled Gradual Disclosure Schemes for Random Bits and Their Applications
-
Springer-Verlag
-
R. Cleve, Controlled Gradual Disclosure Schemes for Random Bits and Their Applications, Advances in Cryptology - CRYPTO'89, Springer-Verlag, 1991, pp. 573-590.
-
(1991)
Advances in Cryptology - CRYPTO'89
, pp. 573-590
-
-
Cleve, R.1
-
7
-
-
85030121757
-
Equivalence Between Two Flavours of Oblivious Transfer
-
Springer-Verlag
-
C. Crépeau, Equivalence Between Two Flavours of Oblivious Transfer, Advances in Cryptology - CRYPTO'87, Springer-Verlag, 1988, pp. 350-354.
-
(1988)
Advances in Cryptology - CRYPTO'87
, pp. 350-354
-
-
Crépeau, C.1
-
8
-
-
21144445360
-
Verifiable Disclosure of Secrets and Applications
-
Springer-Verlag
-
Crépeau, C., Verifiable Disclosure of Secrets and Applications, Advances in Cryptology - Eurocrypt'89, Springer-Verlag, 1990, pp. 181-191.
-
(1990)
Advances in Cryptology - Eurocrypt'89
, pp. 181-191
-
-
Crépeau, C.1
-
10
-
-
84946290541
-
Quantum Oblivious Transfer
-
C. Crépeau, Quantum Oblivious Transfer, Journal of Modem Optics, vol. 41, No. 12, 1994.
-
(1994)
Journal of Modem Optics
, vol.41
, Issue.12
-
-
Crépeau, C.1
-
13
-
-
0022080529
-
A Randomized Protocol for Signing Contracts
-
S. Even, O. Goldreich and A. Lempel, A Randomized Protocol for Signing Contracts, Communications of the ACM, Vol 28, 1985, pp. 637-647.
-
(1985)
Communications of the ACM
, vol.28
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
16
-
-
0023545076
-
How to play any mental game, or: A completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson, How to play any mental game, or: A completeness theorem for protocols with honest majority, 19th ACM Symposium on Theory of Computing, 1987, pp. 218-229.
-
(1987)
19th ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
17
-
-
85032194875
-
How to solve any protocol problem-an efficiency improvement
-
Springer-Verlag
-
O. Goldreich, R. Vainish, How to solve any protocol problem-an efficiency improvement, Advances in Cryptology - CRYPTO'87, Springer-Verlag, 1988, pp. 73 86.
-
(1988)
Advances in Cryptology - CRYPTO'87
, pp. 7386
-
-
Goldreich, O.1
Vainish, R.2
-
18
-
-
84955564077
-
Fair computation of general functions
-
Springer-Verlag
-
S. Goldwasser, L. Levin, Fair computation of general functions in presence of moral majority, Advances in Cryptology - CRYPTO'90, Springer-Verlag, 1991, pp. 77-93.
-
(1991)
Presence of moral majority, Advances in Cryptology - CRYPTO'90
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
21
-
-
0026963441
-
A note on efficient zero-knowledge proofs and arguments
-
J. Kilian, A note on efficient zero-knowledge proofs and arguments, 24th ACM Symposium on Theory of Computation, 1992, pp. 723-732.
-
(1992)
24th ACM Symposium on Theory of Computation
, pp. 723-732
-
-
Kilian, J.1
-
22
-
-
85115135380
-
On the complexity of bounded-interaction and noninteractive zero- knowledge proofs
-
J. Kilian, On the complexity of bounded-interaction and noninteractive zero- knowledge proofs, 35th IEEE Symposium on Foundations of Computer Science, 1994, pp. 466-477.
-
(1994)
35th IEEE Symposium on Foundations of Computer Science
, pp. 466-477
-
-
Kilian, J.1
-
23
-
-
84968329589
-
Reducibility and completeness in multiparty private computations
-
E. Kushilevitz, S. Micali, R. Ostrovski, Reducibility and completeness in multiparty private computations, 35th IEEE Symposium on Foundations of Computer Science, 1994, pp. 478-489.
-
(1994)
35th IEEE Symposium on Foundations of Computer Science
, pp. 478-489
-
-
Kushilevitz, E.1
Micali, S.2
Ostrovski, R.3
-
25
-
-
79551478054
-
Bit Commitment using Pseudo-Randomness
-
Springer-Verlag
-
M. Naor, Bit Commitment using Pseudo-Randomness, Advances in Cryptology - CRYPTO'89, Springer-Verlag, 1989, pp. 128-136.
-
(1989)
Advances in Cryptology - CRYPTO'89
, pp. 128-136
-
-
Naor, M.1
-
27
-
-
0005717392
-
Linear-Time Encodable and Decodable Error-Correcting Codes
-
D. Spielman, Linear-Time Encodable and Decodable Error-Correcting Codes, 27th ACM Symposium on Theory of Computing, 1995, pp. 388-397.
-
(1995)
27th ACM Symposium on Theory of Computing
, pp. 388-397
-
-
Spielman, D.1
|