-
1
-
-
0013056120
-
Practical quantum oblivious transter protocols
-
C. H. Bennett, G. Brassard, C. Crepeau, and M. H. Skubiszewska, Practical quantum oblivious transter protocols, In Advances in Cryptology - CRYPTO’91, pp. 351-366, 1991.
-
(1991)
Advances in Cryptology - CRYPTO’91
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Cr, C.3
Epeauskubiszewska, M.H.4
-
2
-
-
84888252697
-
All-or-nothing disclosure of secrets
-
G. Brassard, C. Crépeau, and J. M. Robert, All-or-nothing disclosure of secrets, In Advances in Cryptology - Crypto 86, pp. 234-238, 1987.
-
(1987)
Advances in Cryptology - Crypto 86
, pp. 234-238
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.M.3
-
3
-
-
84958598231
-
Unconditional security against memory-bounded adversaries
-
C. Cachin and U. Maurer, Unconditional security against memory-bounded adversaries, In Advances in Cryptology - CRYPTO’97, pp. 292-306, 1997.
-
(1997)
Advances in Cryptology - CRYPTO’97
, pp. 292-306
-
-
Cachin, C.1
Maurer, U.2
-
4
-
-
0032313750
-
Oblivious tranfser with a memory-bounded receiver
-
C. Cachin, C Crépeau, and J. Marcil, Oblivious tranfser with a memory-bounded receiver, In Proc. 39th IEEE Symposium in Foundations of Computer Science, pp. 493-502, 1998.
-
(1998)
Proc. 39Th IEEE Symposium in Foundations of Computer Science
, pp. 493-502
-
-
Cachin, C.1
Crépeau, C.2
Marcil, J.3
-
6
-
-
0342980131
-
Equivalence between two flavours of oblivious transter
-
C. Crépeau, Equivalence between two flavours of oblivious transter, In Advances in Cryptology - CRYPTO’87, pp. 351-368, 1987.
-
(1987)
Advances in Cryptology - CRYPTO’87
, pp. 351-368
-
-
Crépeau, C.1
-
7
-
-
84957649042
-
Committed oblivious transter and private multy-party computations
-
C. Crépeau, J. van de Graff, and A. Tapp, Committed oblivious transter and private multy-party computations, In Advances in Cryptology - CRYPTO’95, pp. 110-123, 1995.
-
(1995)
Advances in Cryptology - CRYPTO’95
, pp. 110-123
-
-
Crépeau, C.1
Van De Graff, J.2
Tapp, A.3
-
9
-
-
84969353286
-
On the reversibility of oblivious transter and private multi-party computations
-
C. Crépeau and M. Santha, On the reversibility of oblivious transter and private multi-party computations, In Advances in Cryptology - CRYPTO’95, pp. 110-123, 1995.
-
(1995)
Advances in Cryptology - CRYPTO’95
, pp. 110-123
-
-
Crépeau, C.1
Santha, M.2
-
10
-
-
84880895217
-
Oblivious Transfer in the Bounded Storage Model
-
Y. Z. Ding, Oblivious Transfer in the Bounded Storage Model, In Advances in Cryptology - CRYPTO 2001, pp. 155-170, 2001.
-
(2001)
Advances in Cryptology - CRYPTO 2001
, pp. 155-170
-
-
Ding, Y.Z.1
-
11
-
-
0020878801
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel, A randomized protocol for signing contracts, In Advances in Cryptology - CRYPTO’82, pp. 205-210, 1982.
-
(1982)
Advances in Cryptology - CRYPTO’82
, pp. 205-210
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
12
-
-
0023545076
-
How to play ahy mental game or a completeness theorem for protocols with homest majority
-
O. Goldreich, S. Micali, and A. Wigderson, How to play ahy mental game or a completeness theorem for protocols with homest majority, In Proc. 19th ACM Symposium on Theory of Computing, pp. 218-229, 1987.
-
(1987)
Proc. 19Th ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
0033725451
-
Reducibility and completeness in private computations
-
J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky, Reducibility and completeness in private computations, SIAM Journal on Computing, 29(4), pp.1189-1208, 2000.
-
(2000)
SIAM Journal on Computing
, vol.29
, Issue.4
, pp. 1189-1208
-
-
Kilian, J.1
Kushilevitz, E.2
Micali, S.3
Ostrovsky, R.4
-
15
-
-
0141544069
-
Perfect sero-knowledge arguments for NP using any one-way function
-
Preliminary version presented at CRYPTO’92
-
M. Naor, R. Ostrovsky, R. Venkatesan, and M. Yung, Perfect sero-knowledge arguments for NP using any one-way function, Journal of Cryptology, 11(2), pp. 87-108, 1998. Preliminary version presented at CRYPTO’92.
-
(1998)
Journal of Cryptology
, vol.11
, Issue.2
, pp. 87-108
-
-
Naor, M.1
Ostrovsky, R.2
Venkatesan, R.3
Yung, M.4
-
17
-
-
0020829007
-
Transaction Protection by Beacons
-
M. O. Rabin, Transaction Protection by Beacons, JCSS 27(2), pp. 256-267, 1983.
-
(1983)
JCSS
, vol.27
, Issue.2
, pp. 256-267
-
-
Rabin, M.O.1
-
18
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
P. W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Computing, 26(5), pp. 1484-1509, 1997.
-
(1997)
SIAM J. Computing
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
19
-
-
0842305624
-
On the connections between universal hasing, combinatorial designs and error-correcting codes
-
D. R. Stinson, On the connections between universal hasing, combinatorial designs and error-correcting codes, Congressus Numerantium 114, pp. 7-27, 1996.
-
(1996)
Congressus Numerantium
, vol.114
, pp. 7-27
-
-
Stinson, D.R.1
|