-
2
-
-
0021557360
-
RSN/Rabin Bits are 1/2 + (1/poly(k)) Secure
-
Alexi, W., Chor, B., Goldreich O. and Schnorr C.P. RSN/Rabin Bits are 1/2 + (1/poly(k)) Secure. Proc. 25th FOCS, IEEE, 1984, pp. 449-457.
-
(1984)
Proc. 25Th FOCS, IEEE
, pp. 449-457
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.P.4
-
3
-
-
0009011118
-
Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC1
-
ACM, May
-
Barrington, D.A. Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC1. 18th STOC, ACM, May, 1986, pp. 1-5.
-
(1986)
18Th STOC
, pp. 1-5
-
-
Barrington, D.A.1
-
4
-
-
85032202466
-
-
Proceedings of ICALP-85, July
-
Ben Or, M., O. Goldreich, S. Micali, and R. Rivest A Fair Protocol for Signing Contracts. Proceedings of ICALP-85, July, 1985, pp. 43-52.
-
(1985)
A Fair Protocol for Signing Contracts
, pp. 43-52
-
-
Ben Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.4
-
5
-
-
84883938043
-
Distributing the Power of a Government to Enhance the Privacy of Voters
-
Benaloh, J.C. and Yung M. Distributing the Power of a Government to Enhance the Privacy of Voters. Proc. 5th PODC, ACM, 1986, pp. 52-62.
-
(1986)
Proc. 5Th PODC, ACM
, pp. 52-62
-
-
Benaloh, J.C.1
Yung, M.2
-
6
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
-
1982, pp. 112-117. Also in: SIAM Journal on Computing, November
-
Blum, M. and Micali, S. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. Proc. 23rd FOCS, IEEE, 1982, pp. 112-117. Also in: SIAM Journal on Computing, November 1984, 850-864.
-
(1984)
Proc. 23Rd FOCS, IEEE
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
7
-
-
84949995981
-
An Efficient Probabilistic Public-Key Scheme Which Hides All Partial Information
-
Blum, M. and S. Goldwasser. An Efficient Probabilistic Public-Key Scheme Which Hides All Partial Information. Proceedings of Crypto84, 1985, pp. 289-301.
-
(1985)
Proceedings of Crypto84
, pp. 289-301
-
-
Blum, M.1
Goldwasser, S.2
-
8
-
-
0020932981
-
Comparison of Two Pseudo-Random Number Generators
-
August
-
Blum, L., Blum M. and Shub M. Comparison of Two Pseudo-Random Number Generators. Proceedings of Crypto82, August, 1982, pp. 61-78.
-
(1982)
Proceedings of Crypto82
, pp. 61-78
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
9
-
-
84976804419
-
How to Exchange (Secret) Keys
-
May
-
Blum, M. “How to Exchange (Secret) Keys”. ACM Transactions on Computer System 1,2 (May 1983), 175-193.
-
(1983)
ACM Transactions on Computer System
, vol.1
, Issue.2
, pp. 175-193
-
-
Blum, M.1
-
10
-
-
85032175280
-
Pseudorandom Generators and Complexity Classes
-
Boppana, R.B. and R. Hirschfeld. Pseudorandom Generators and Complexity Classes. Preprint, 1986.
-
(1986)
Preprint
-
-
Boppana, R.B.1
Hirschfeld, R.2
-
13
-
-
0022199386
-
Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. Proc. 26th FOCS
-
Chor, B., Goldwasser S., Micali S. and Awerbuch B. Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. Proc. 26th FOCS, IEEE, 1985, pp. 383-395.
-
(1985)
IEEE
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
14
-
-
0022188127
-
A Robust and Verifiable Cryptographically Secure Election Scheme
-
Cohen, J.C. (Benaloh) and Fischer M.J. A Robust and Verifiable Cryptographically Secure Election Scheme. Proc. 26th FOCS, IEEE, 1985, pp. 372-383.
-
(1985)
Proc. 26Th FOCS, IEEE
, pp. 372-383
-
-
Cohen, J.C.1
Fischer, M.J.2
-
15
-
-
84976671974
-
Cryptographic Protocols
-
ACM-SIGACT, May
-
DeMillo, R.A., N. Lynch and M. Merritt. Cryptographic Protocols. 14th STOC, ACM-SIGACT, May, 1982, pp. 383-400.
-
(1982)
14Th STOC
, pp. 383-400
-
-
Demillo, R.A.1
Lynch, N.2
Merritt, M.3
-
17
-
-
0022080529
-
A Randomized Protocol for Signing Contracts
-
June
-
Even, S., Goldreich O. and Lempel A. “A Randomized Protocol for Signing Contracts”. Communications of the ACM 28,6 (June 1985), 637-647.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
18
-
-
0023569922
-
Zero-Knowledge Proofs of Identity
-
Feige, U., A. Fiat and A. Shamir. Zero-Knowledge Proofs of Identity. 19th STOC, 1986, pp. 210-217.
-
(1986)
19Th STOC
, pp. 210-217
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
20
-
-
0022238417
-
Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cqposystems
-
Galil, Z., Haber S. and Yung M. A private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cqposystems. Proc. 26th FOCS, IEEE, 1985, pp. 360-371.
-
(1985)
Proc. 26Th FOCS, IEEE
, pp. 360-371
-
-
Galil, Z.1
Haber, S.2
Yung, M.A.3
-
21
-
-
0021567758
-
How to Construct Random Functions
-
Goldreich, O., S. Goldwasser, and S. Micali. How to Construct Random Functions. Proc. 25th FOCS, IEEE, 1984, pp. 464-479.
-
(1984)
Proc. 25Th FOCS, IEEE
, pp. 464-479
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
23
-
-
0022914590
-
Proofs that Yield Nothing But their Validity and a Methodology of Cryptogrphic Protocol Design
-
October
-
Goldreich, O., S. Micali and A. Wigderson. Proofs that Yield Nothing But their Validity and a Methodology of Cryptogrphic Protocol Design. 27th FOCS, IEEE, October, 1986, pp. 174-187.
-
(1986)
27Th FOCS, IEEE
, pp. 174-187
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
25
-
-
85050160774
-
Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information
-
ACM-SIGACT, May
-
Goldwasser, S. and Micali S. Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information. Proceedings of the 14th Annual ACM Symp. on Theory of Computing, ACM-SIGACT, May, 1982, pp. 365-377.
-
(1982)
Proceedings of the 14Th Annual ACM Symp. on Theory of Computing
, pp. 365-377
-
-
Goldwasser, S.1
Micali, S.2
-
26
-
-
0021941417
-
-
17 STOC, ACM-SIGACT, May
-
Goldwasser, S., S. Micali and C. Rackoff. The Knowledge Complexity of Interactive Proof-Systems. 17 STOC, ACM-SIGACT, May, 1985, pp. 291-304.
-
(1985)
The Knowledge Complexity of Interactive Proof-Systems
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
28
-
-
0021975313
-
-
17th STOC, ACM-SIGACT, May
-
Hastad, J. and A. Shamir. The Cryptographic Security of Truncated Linearly Related Variables. 17th STOC, ACM-SIGACT, May, 1985, pp. 356-362.
-
(1985)
The Cryptographic Security of Truncated Linearly Related Variables
, pp. 356-362
-
-
Hastad, J.1
Shamir, A.2
-
31
-
-
85032220184
-
One-way Functions and Pseudorandom Generators
-
Levin, L. One-way Functions and Pseudorandom Generators. Proc. 17th STOC, ACM, 1985.
-
(1985)
Proc. 17Th STOC, ACM
-
-
Levin, L.1
-
32
-
-
0020889143
-
-
24 FOCS, IEEE, November
-
Luby, M., Micali S. and Rackoff C. How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin. 24 FOCS, IEEE, November, 1983, pp. 11-22.
-
(1983)
How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin
, pp. 11-22
-
-
Luby, M.1
Micali, S.2
Rackoff, C.3
-
33
-
-
0018456413
-
Relations among Complexity Measures
-
Pippenger, N., and M.J. Fischer. “Relations among Complexity Measures”. Journal of the ACM 26 (1979), 361-381.
-
(1979)
Journal of the ACM
, vol.26
, pp. 361-381
-
-
Pippenger, N.1
Fischer, M.J.2
-
35
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
-
February
-
Rivest, R., Shamir A., Adleman L. “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”. Commications of the ACM 21,2 (February 1978), 120-126.
-
(1978)
Commications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
36
-
-
0018545449
-
How to Share a Secret
-
November
-
Shamir, A. “How to Share a Secret”. Communicarions of the ACM 22,11 (November 1979), 612-613.
-
(1979)
Communicarions of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
37
-
-
3042680831
-
Mental Poker
-
Mathematical Gardner. Klarner D. E., Ed
-
Shamir, A., Rivest R. Adleman L. Mental Poker. In Mathematical Gardner. Klarner D. E., Ed., Wadsworth Intrntl, 1981, pp. 37-43.
-
(1981)
Wadsworth Intrntl
, pp. 37-43
-
-
Shamir, A.1
Rivest, R.2
Adleman, L.3
-
38
-
-
0021548502
-
Efficient and Secure Pseudo-Random Number Generation
-
Vazirani, U. and Vazirani V. Efficient and Secure Pseudo-Random Number Generation. Proc. 25th FOCS, IEEE, 1984, pp. 458-463.
-
(1984)
Proc. 25Th FOCS, IEEE
, pp. 458-463
-
-
Vazirani, U.1
Vazirani, V.2
-
39
-
-
0020918124
-
Trapdoor Pseudo-random Number Generators, with Applications to Protocol Design
-
November
-
Vazirani, U. and Vazirani V. Trapdoor Pseudo-random Number Generators, with Applications to Protocol Design. 24th FOCS, IEEE, November, 1983, pp. 23-30.
-
(1983)
24Th FOCS, IEEE
, pp. 23-30
-
-
Vazirani, U.1
Vazirani, V.2
-
40
-
-
0020312165
-
Protocols for Secure Computations
-
IEEE, November
-
Yao, A. Protocols for Secure Computations. 23rd FOCS, IEEE, November, 1982, pp. 160-164.
-
(1982)
23Rd FOCS
, pp. 160-164
-
-
Yao, A.1
-
41
-
-
0020301290
-
Theory and Applications of Trapdoor Functions
-
IEEE, November
-
Yao, A. Theory and Applications of Trapdoor Functions. 23rd FOCS, IEEE, November, 1982, pp. 80-91.
-
(1982)
23Rd FOCS
, pp. 80-91
-
-
Yao, A.1
-
42
-
-
0022882770
-
How to Generate and Exchange Secrets
-
IEEE, October
-
Yao, A. How to Generate and Exchange Secrets. 27th FOCS, IEEE, October, 1986, pp. 162-167.
-
(1986)
27Th FOCS
, pp. 162-167
-
-
Yao, A.1
|