-
3
-
-
0003259517
-
Quantum Cryptography: Public key distribution and coin tossing
-
Banglore, India, December
-
Bennett, C.H., G. Brassard, Quantum Cryptography: Public key distribution and coin tossing, Proc. of IEEE International Conference on Computers, Systems, and Signal Processing, Banglore, India, December 1984, pp. 175-179.
-
(1984)
Proc. of IEEE International Conference on Computers, Systems, and Signal Processing
-
-
Bennett, C.H.1
Brassard, G.2
-
4
-
-
0023985539
-
Privacy Amplification by Public Discussion
-
Bennett, C.H., G. Brassard, J.-M. Robert, Privacy Amplification by Public Discussion, SIAM Journal on Computing, Vol. 17, No.2, 1988, pp. 210-229.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
5
-
-
0027803208
-
A quantum bit commitment scheme provably unbreakable by both parties
-
November
-
Brassard, G., C. Crepeau, R. Jozsa, D. Langlois, A quantum bit commitment scheme provably unbreakable by both parties, Proceeding of the 34t.h annual IEEE Symposium on Foundations of Computer Science, November 1993,pp. 362-371.
-
(1993)
Proceeding of the 34T.H Annual IEEE Symposium on Foundations of Computer Science
, pp. 362-371
-
-
Brassard, G.1
Crepeau, C.2
Jozsa, R.3
Langlois, D.4
-
6
-
-
84969361843
-
Practical Quantum Oblivious Transfer
-
Springer Verlag, Berlin
-
Bennett, C.H., G. Brassard, C. Crepeau, M.-H. Skubiszewska, Practical Quantum Oblivious Transfer, In proceedings of CRYPTO’91, Lecture Notes in Computer Science, vol 576, Springer Verlag, Berlin, 1992, pp 351-366.
-
(1992)
Proceedings of CRYPTO’91, Lecture Notes in Computer Science
, vol.576
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Skubiszewska, M.-H.4
-
7
-
-
0020913618
-
On computationally secure authentication tags requiring short secret shared keys
-
Plenum Press
-
Brassard, G., On computationally secure authentication tags requiring short secret shared keys, Advances in Cryptology: Proceedings of CRYPTO 82, Plenum Press, 1983, pp.79-86.
-
(1983)
Advances in Cryptology: Proceedings of CRYPTO 82
, pp. 79-86
-
-
Brassard, G.1
-
8
-
-
6544287071
-
Cryptology column — Quantum cryptography
-
Brassard, G., Cryptology column — Quantum cryptography: A bibliography, Sigact News, vol. 24, no. 3, 1993, pp.16-20.
-
(1993)
A Bibliography, Sigact News
, vol.24
, Issue.3
, pp. 16-20
-
-
Brassard, G.1
-
9
-
-
0019572642
-
New Hash Functions and Their Use in Authentication and Set Equality
-
Carter, J.L., M. N. Wegman, New Hash Functions and Their Use in Authentication and Set Equality, Journal of Computer and System Sciences, Vol. 22, 1981, pp. 265-279.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Carter, J.L.1
Wegman, M.N.2
-
10
-
-
0022198802
-
The bit extraction problem or t-resilient functions
-
Portland, Oregon
-
Clior, B., O. Goldreich, J. Hastad, J. Freidman, S. Rudich, R. Smolensky, The bit extraction problem or t-resilient functions, Proc. 26th IEEE Symposium on Foundation of Computer Science, Portland, Oregon, 1985, pp.396-407.
-
(1985)
Proc. 26Th IEEE Symposium on Foundation of Computer Science
, pp. 396-407
-
-
Clior, B.1
Goldreich, O.2
Hastad, J.3
Freidman, J.4
Rudich, S.5
Smolensky, R.6
-
11
-
-
21144435910
-
Efficient reductions among oblivious transfer protocols based on new self-intersecting codes
-
Springer- Verlag
-
Crepeau, C. and M. Santha. Efficient reductions among oblivious transfer protocols based on new self-intersecting codes. In Sequences II, Methods in Communications, Security, and Computer Science, pp. 360-368. Springer- Verlag, 1991.
-
(1991)
Sequences II, Methods in Communications, Security, and Computer Science
, pp. 360-368
-
-
Crepeau, C.1
Santha, M.2
-
13
-
-
0022080529
-
A randomized protocol for signing contracts”
-
Even, S., Goldreich, O. and Lempel, A., “A randomized protocol for signing contracts”, Communications of the ACM, vol. 28, 1985, pp.637-647.
-
(1985)
Communications of the ACM
, vol.28
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
14
-
-
84957677110
-
Comparing Common Secret Information without Leaking it, submitted for publication
-
Fagin, R., M. Naor and P. Winkler, Comparing Common Secret Information without Leaking it, submitted for publication, Communications of the ACM, 1994.
-
(1994)
Communications of the ACM
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
15
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
In A. M. Odlyzko, editor, Springer, Lecture Notes in Computer Science No
-
Fiat, A and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In A. M. Odlyzko, editor, Proceedings CRYPTO 86, pages 186-194. Springer, 1987. Lecture Notes in Computer Science No. 263.
-
(1987)
Proceedings CRYPTO 86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
17
-
-
0021567758
-
How to construct random functions
-
Singer Island, 1984. IEEE
-
Goldreich, O., S. Goldwasser, and S. Micali. How to construct random functions. In Proceedings of the 25th IEEE Symposium on Foundations of Computer Science, pp. 464-479, Singer Island, 1984. IEEE.
-
Proceedings of the 25Th IEEE Symposium on Foundations of Computer Science
, pp. 464-479
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
21
-
-
0013099162
-
Quantum Oblivious Transfer is Secure Against Individual Measurements
-
Dallas
-
Mayers, D., L. Salvail, Quantum Oblivious Transfer is Secure Against Individual Measurements, In the Proceedings of PHYSCOMP 94, Dallas, 1994, pp. 69-77.
-
(1994)
In the Proceedings of PHYSCOMP 94
, pp. 69-77
-
-
Mayers, D.1
Salvail, L.2
-
22
-
-
84956073647
-
Experimental demonstration of quantum cryptography using polarized photons in optical fiber over more than 1 km
-
20 August 1993
-
Muller, A., Breguet, J. and Gisin, N., Experimental demonstration of quantum cryptography using polarized photons in optical fiber over more than 1 km In Europhysics Letters, vol. 23, no. 6, 20 August 1993, pp..383-388.
-
Europhysics Letters
, vol.23
, Issue.6
, pp. 383-388
-
-
Muller, A.1
Breguet, J.2
Gisin, N.3
-
23
-
-
0003462641
-
-
Technical Memo TR-81, Aiken Computation Laboratory, Harvard University
-
Rabin, M. O., How to exchange secrets by oblivious transfer, Technical Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981.
-
(1981)
How to Exchange Secrets by Oblivious Transfer
-
-
Rabin, M.O.1
-
24
-
-
84934371820
-
-
Master thesis, Departement d’informatique et de Recherche Operationnelle, Universite de Montreal, Montreal, Quebec, Canada
-
Robert, J.-M., Detection et. correction d’erreur en crypt.ographie, Master thesis, Departement d’informatique et de Recherche Operationnelle, Universite de Montreal, Montreal, Quebec, Canada, 1985.
-
(1985)
Detection Et. Correction d’erreur En Crypt.Ographie
-
-
Robert, J.-M.1
-
26
-
-
84957657050
-
-
New York Times, 13 May 1993
-
One Less Thing to Believe In: Fraud at Fake Cash Machine, New York Times, 13 May 1993, pp. A1-B9.
-
-
-
|