-
1
-
-
84974618488
-
How to Generated Random Factored numbers
-
E. Bach, How to Generated Random Factored numbers, SIAM Journal on Computing, vol. 17, n. 2, 1988.
-
(1988)
SIAM Journal on Computing
, vol.2
, pp. 17
-
-
Bach, E.1
-
3
-
-
84948138574
-
Adaptive Zero-Knowledge and Computational Equivocation
-
D. Beaver, Adaptive Zero-Knowledge and Computational Equivocation, in Proc. Of FOCS 96.
-
Proc. Of FOCS 96
-
-
Beaver, D.1
-
4
-
-
84974538446
-
Methodology for Constructing Signature Schemes based on Non-Interactive Zero-Knowledge Proofs
-
M. Bellare and S. Goldwasser, Methodology for Constructing Signature Schemes based on Non-Interactive Zero-Knowledge Proofs, in Proc. Of CRYPTO 88.
-
Proc. Of CRYPTO 88
-
-
Bellare, M.1
Goldwasser, S.2
-
5
-
-
0026383119
-
Non-Interactive Zero- Knowledge
-
M. Blum, A. De Santis, S. Micali, and G. Persiano, Non-Interactive Zero- Knowledge, SIAM Journal of Computing, vol. 20, no. 6, Dec 1991, pp. 1084-1118.
-
(1991)
SIAM Journal of Computing
, vol.20
, Issue.6
, pp. 1084-1118
-
-
Blum, M.1
De Santis, A.2
Micali, S.3
Persiano, G.4
-
7
-
-
0021522644
-
How to Generate Cryptographically Strong Sequence of Pseudo-Random Bits
-
M. Blum and S. Micali, How to Generate Cryptographically Strong Sequence of Pseudo-Random Bits, SIAM J. on Computing, vol. 13, no. 4, 1984, pp. 850-864.
-
(1984)
SIAM J. On Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
8
-
-
0000867507
-
Minimum Disclosure Proofs of Knowledge
-
G. Brassard, C. Crépeau, and D. Chaum, Minimum Disclosure Proofs of Knowledge, Journal of Computer and System Sciences, vol. 37, no. 2, pp. 156-189.
-
Journal of Computer and System Sciences
, vol.37
, Issue.2
, pp. 156-189
-
-
Brassard, G.1
Crépeau, C.2
Chaum, D.3
-
10
-
-
0012582886
-
Zero-Knowledge Proofs of Knowledge without Interaction
-
A. De Santis and P. Persiano, Zero-Knowledge Proofs of Knowledge without Interaction, in Proc. Of FOCS 92.
-
Proc. Of FOCS 92
-
-
De Santis, A.1
Persiano, P.2
-
13
-
-
84949022620
-
Multiple Non-Interactive Zero-Knowledge Proofs Based on a Single Random String
-
U. Feige, D. Lapidot, and A. Shamir, Multiple Non-Interactive Zero-Knowledge Proofs Based on a Single Random String, in Proc. Of STOC 90.
-
Proc. Of STOC 90
-
-
Feige, U.1
Lapidot, D.2
Shamir, A.3
-
14
-
-
0022793132
-
How to Construct Random Functions
-
O. Goldreich, S. Goldwasser, and S. Micali, How to Construct Random Functions, Journal of the ACM, vol. 33, no. 4, 1986, pp. 792-807.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
16
-
-
71149116146
-
Proofs that Yield Nothing but their Validity or All Languages in NP Have Zero-Knowledge Proof Systems
-
O. Goldreich, S. Micali, and A. Wigderson, Proofs that Yield Nothing but their Validity or All Languages in NP Have Zero-Knowledge Proof Systems, Journal of the ACM, vol. 38, n. 1, 1991, pp. 691-729.
-
(1991)
Journal of the ACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
17
-
-
0021409284
-
Probabilistic Encryption
-
S. Goldwasser, and S. Micali, Probabilistic Encryption, Journal of Computer and System Sciences, vol. 28, n. 2, 1984, pp. 270-299.
-
(1984)
Journal of Computer and System Sciences
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
18
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof-Systems
-
S. Goldwasser, S. Micali, and C. Rackoff, The Knowledge Complexity of Interactive Proof-Systems, SIAM Journal on Computing, vol. 18, n. 1, 1989.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
19
-
-
0345253860
-
Construction of a Pseudo- Random Generator from any One-Way Function
-
J. Hastad, R. Impagliazzo, L. Levin, and M. Luby, Construction of a Pseudo- Random Generator from any One-Way Function, SIAM Journal on Computing, vol. 28, n. 4, pp. 1364-1396, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
20
-
-
85029660870
-
One-Way Functions are Necessary for Complexity- Based Cryptography
-
R. Impagliazzo and M. Luby, One-Way Functions are Necessary for Complexity- Based Cryptography, in Proc. Of FOCS 89.
-
Proc. Of FOCS 89
-
-
Impagliazzo, R.1
Luby, M.2
-
21
-
-
33745556642
-
Limits on the Provable Consequences of One-Way Permutations
-
R. Impagliazzo and S. Rudich, Limits on the Provable Consequences of One-Way Permutations, in Proc. Of STOC 91.
-
Proc. Of STOC 91
-
-
Impagliazzo, R.1
Rudich, S.2
-
22
-
-
0023984964
-
How to Construct a Pseudo-Random Permutation from a Pseudo-Random Function
-
M. Luby and C. Rackoff, How to Construct a Pseudo-Random Permutation from a Pseudo-Random Function, in SIAM Journal on Computing, vol. 17, n.2, Aug 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
-
-
Luby, M.1
Rackoff, C.2
-
23
-
-
84949044492
-
Bit Commitment using Pseudorandomness
-
M. Naor, Bit Commitment using Pseudorandomness, in Proc. Of CRYPTO 91.
-
Proc. Of CRYPTO 91
-
-
Naor, M.1
-
24
-
-
84974533327
-
Universal One-way Hash Functions and their Cryptographic Applications
-
M. Naor and M. Yung, Universal One-way Hash Functions and their Cryptographic Applications, in Proc. Of STOC 89.
-
Proc. Of STOC 89
-
-
Naor, M.1
Yung, M.2
-
25
-
-
84974624785
-
Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attack
-
M. Naor and M. Yung, Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attack, Proc. Of STOC 90.
-
Proc. Of STOC 90
-
-
Naor, M.1
Yung, M.2
-
26
-
-
84974615931
-
One-way Functions are Necessary for Non-Trivial Zero-Knowledge Proofs
-
R. Ostrovsky and A. Wigderson, One-way Functions are Necessary for Non-Trivial Zero-Knowledge Proofs, in Proc. Of ISTCS 93.
-
Proc. Of ISTCS 93
-
-
Ostrovsky, R.1
Wigderson, A.2
-
27
-
-
33746160194
-
One-way Functions are Necessary and Sufficient for Secure Signatures
-
J. Rompel, One-way Functions are Necessary and Sufficient for Secure Signatures, in Proc. Of STOC 90.
-
Proc. Of STOC 90
-
-
Rompel, J.1
-
28
-
-
84974539088
-
Theory and Applications of Trapdoor Functions
-
A. Yao, Theory and Applications of Trapdoor Functions, in Proc. Of FOCS 82.
-
Proc. Of FOCS 82
-
-
Yao, A.1
|