-
1
-
-
34748841353
-
Elementary Gates for Quantum Computation
-
Nov
-
Barenco, A., Bennett, C. H., Cleve, R., DiVincenzo, D. P., Margolus, N., Shor, P., Sleator, T., Smolin, J., and Weinfurter, H. Elementary Gates for Quantum Computation. Physical Review A 52, 5 (Nov. 1995), 3457-3467.
-
(1995)
Physical Review A
, vol.52
, Issue.5
, pp. 3457-3467
-
-
Barenco, A.1
Bennett, C.H.2
Cleve, R.3
Divincenzo, D.P.4
Margolus, N.5
Shor, P.6
Sleator, T.7
Smolin, J.8
Weinfurter, H.9
-
2
-
-
84945119254
-
Entity authentication and key distribution
-
22-26 Aug, D. R. Stinson, Ed, of Lecture Notes in Computer Science, Springer-Verlag
-
Bellare, M., and Rogaway, P. Entity authentication and key distribution. In Advances in Cryptology-CRYPTO ’93 (22-26 Aug. 1993), D. R. Stinson, Ed., vol. 773 of Lecture Notes in Computer Science, Springer-Verlag, pp. 232-249.
-
(1993)
Advances in Cryptology-Crypto ’93
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84957629783
-
Relations among Notions of Security for Public-Key Encryption Schemes
-
Bellare, M., Desai, A., Pointcheval, D., and Rogaway, P. Relations among Notions of Security for Public-Key Encryption Schemes. In Advances in Cryptology-CRYPTO’98 (1998), pp. 26-45.
-
(1998)
In Advances in Cryptology-CRYPTO’98
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
5
-
-
0001063035
-
Strengths and weaknesses of quantum computing
-
Oct
-
Bennett, C. H., Bernstein, E., Brassard, G., and Vazirani, U. Strengths and weaknesses of quantum computing. SIAM J. Comput. 26, 5 (Oct. 1997), 1510-1523.
-
(1997)
SIAM J. Comput
, vol.26
, Issue.5
, pp. 1510-1523
-
-
Bennett, C.H.1
Bernstein, E.2
Brassard, G.3
Vazirani, U.4
-
6
-
-
0026626314
-
Experimental quantum cryptography
-
Bennett, C. H., Bessette, F., Brassard, G., Salvail, L., and Smolin, J. Experimental quantum cryptography. Journal of Cryptology 5, 1 (1992), 3-28.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
7
-
-
85032431591
-
An update on quantum cryptography
-
19-22 Aug. 1984G. R. Blakley and D. Chaum, Eds, of Lecture Notes in Computer Science, Springer-Verlag
-
Bennett, C. H., and Brassard, G. An update on quantum cryptography. In Advances in Cryptology: Proceedings of CRYPTO 84 (19-22 Aug. 1984), G. R. Blakley and D. Chaum, Eds., vol. 196 of Lecture Notes in Computer Science, Springer-Verlag, 1985, pp. 475-480.
-
(1985)
Advances in Cryptology: Proceedings of CRYPTO 84
, vol.196
, pp. 475-480
-
-
Bennett, C.H.1
Brassard, G.2
-
8
-
-
84969361843
-
-
(11-15 Aug. 1991)J. Feigenbaum, Ed, of Lecture Notes in Computer Science, Springer-Verlag
-
Bennett, C. H., Brassard, G., Crépeau, C., and Skubiszewska, M.-H. Practical quantum oblivious transfer. In Advances in Cryptology-CRYPTO ’91 (11-15 Aug. 1991), J. Feigenbaum, Ed., vol. 576 of Lecture Notes in Computer Science, Springer-Verlag, 1992, pp. 351-366.
-
(1992)
Practical quantum oblivious transfer. In Advances in Cryptology-CRYPTO ’91
, vol.576
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, M.-H.4
-
9
-
-
0002977951
-
Quantum cryptography
-
Oct
-
Bennett, C. H., Brassard, G., and Ekert, A. K. Quantum cryptography. Scientific America 262, 10 (Oct. 1992), 26-33.
-
(1992)
Scientific America
, vol.262
, Issue.10
, pp. 26-33
-
-
Bennett, C.H.1
Brassard, G.2
Ekert, A.K.3
-
10
-
-
11944263767
-
Quantum cryptography without Bell’s theorem
-
Bennett, C. H., Brassard, G., and Mermin, N. D. Quantum cryptography without Bell’s theorem. Physical Review Letters 68, 5 (Feb. 1992), 557-559.
-
(1992)
Physical Review Letters
, vol.68
, Issue.5
, pp. 557-559
-
-
Bennett, C.H.1
Brassard, G.2
Mermin, N.D.3
-
11
-
-
84948972108
-
Security Aspects of Practical Quantum Cryptography
-
Brassard, G., Lütkenhaus, N., Tal, M., and Sanders, B. C. Security Aspects of Practical Quantum Cryptography. In Advances in Cryptology- EUROCRYPT2000 (2000), pp. 289-299.
-
(2000)
Advances in Cryptology- EUROCRYPT2000
, pp. 289-299
-
-
Brassard, G.1
Lütkenhaus, N.2
Tal, M.3
Sanders, B.C.4
-
12
-
-
85007343167
-
Quantum bit commitment and coin tossing protocols
-
11-15 Aug. 1990A. J. Menezes and S. A. Vanstone, Eds, of Lecture Notes in Computer Science, Springer-Verlag
-
Brassard, G., and Crépeau, C. Quantum bit commitment and coin tossing protocols. In Advances in Cryptology-CRYPTO ’90 (11-15 Aug. 1990), A. J. Menezes and S. A. Vanstone, Eds., vol. 537 of Lecture Notes in Computer Science, Springer-Verlag, 1991, pp. 49-61.
-
(1991)
Advances in Cryptology-Crypto ’90
, vol.537
, pp. 49-61
-
-
Brassard, G.1
Crépeau, C.2
-
13
-
-
0024079003
-
A knapsack-type public key cryptosystem based on arithmetic in finite fields
-
Chor, B., and Rivest, R. L. A knapsack-type public key cryptosystem based on arithmetic in finite fields. IEEE Trans. on Information Theory 34 (1988), 901-909.
-
(1988)
IEEE Trans. on Information Theory
, vol.34
, pp. 901-909
-
-
Chor, B.1
Rivest, R.L.2
-
16
-
-
84957700505
-
Quantum oblivious mutual identification
-
Crépeau, C., and Salvail, L. Quantum oblivious mutual identification. In Guillou and Quisquater [26], pp. 133-146.
-
Guillou and Quisquater
, Issue.26
, pp. 133-146
-
-
Crépeau, C.1
Salvail, L.2
-
17
-
-
0000119236
-
Rapid solution of problems by quantum computation
-
Deutsch, D., and Jozsa, R. Rapid solution of problems by quantum computation. Proc. R. Soc. Lond. A 439 (1992), 553-558.
-
(1992)
Proc. R. Soc. Lond. A
, vol.439
, pp. 553-558
-
-
Deutsch, D.1
Jozsa, R.2
-
19
-
-
84948989963
-
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation
-
Dumais, P., Mayers, D., and Savail, L. Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation. In Advances in Cryptology-EUROCRYPT2000 (2000), pp. 300-315.
-
(2000)
In Advances in Cryptology-Eurocrypt2000
, pp. 300-315
-
-
Dumais, P.1
Mayers, D.2
Savail, L.3
-
20
-
-
84956859011
-
How to Enhance the Security of Public-Key Encryption at Minimum Cost
-
Fujisaki, E. and Okamoto, T. How to Enhance the Security of Public-Key Encryption at Minimum Cost. In PKC’99 (1999), pp. 53-68.
-
(1999)
In PKC’99
, pp. 53-68
-
-
Fujisaki, E.1
Okamoto, T.2
-
21
-
-
84955339164
-
Secure Integration of Asymmetric and Symmetric Encryption Schemes
-
Fujisaki, E. and Okamoto, T. Secure Integration of Asymmetric and Symmetric Encryption Schemes. In Advances in Cryptology-CRYPTO’99 (1999), pp. 537-554.
-
(1999)
In Advances in Cryptology-CRYPTO’99
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
22
-
-
84926399824
-
On the foundations of modern cryptography
-
17-21 Aug., B. S. Kaliski Jr., Ed, of Lecture Notes in Computer Science, Springer-Verlag
-
Goldreich, O. On the foundations of modern cryptography. In Advances in Cryptology-CRYPTO ’97 (17-21 Aug. 1997), B. S. Kaliski Jr., Ed., vol. 1294 of Lecture Notes in Computer Science, Springer-Verlag, pp. 46-74.
-
(1997)
Advances in Cryptology-Crypto ’97
, vol.1294
, pp. 46-74
-
-
Goldreich, O.1
-
23
-
-
0021409284
-
-
Apr
-
Goldwasser, S., and Micali, S. Probabilistic encryption. J. Comput. Syst. Sci. 28, 2 (Apr. 1984), 270-299.
-
(1984)
Probabilistic encryption
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
24
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Apr
-
Goldwasser, S., Micali, S., and Rivest, R. L. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 2 (Apr. 1988), 281-308.
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
26
-
-
84983179310
-
-
21-25 May, of Lecture Notes in Computer Science, Springer-Verlag
-
Guillou, L. C., and Quisquater, J.-J., Eds. Advances in Cryptology- EUROCRYPT 95 (21-25 May 1995), vol. 921 of Lecture Notes in Computer Science, Springer-Verlag.
-
(1995)
Advances in Cryptology- EUROCRYPT 95
, vol.921
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
29
-
-
84955621476
-
Quantum key distribution and string oblivious transfer in noisy channels
-
18-22 Aug, N. Koblitz, Ed, of Lecture Notes in Computer Science, Springer-Verlag
-
Mayers, D. Quantum key distribution and string oblivious transfer in noisy channels. In Advances in Cryptology-CRYPTO ’96 (18-22 Aug. 1996), N. Koblitz, Ed., vol. 1109 of Lecture Notes in Computer Science, Springer-Verlag, pp. 343-357.
-
(1996)
Advances in Cryptology-Crypto ’96
, vol.1109
, pp. 343-357
-
-
Mayers, D.1
-
30
-
-
0018019325
-
Hiding information and signatures in trapdoor knapsacks
-
Merkle, R. C., and Hellman, M. E. Hiding information and signatures in trapdoor knapsacks. IEEE Trans. on Information Theory 24 (1978), 525-530.
-
(1978)
IEEE Trans. on Information Theory
, vol.24
, pp. 525-530
-
-
Merkle, R.C.1
Hellman, M.E.2
-
31
-
-
84983172413
-
-
Trans. of the IEICE J71-D, Feb, Japanese
-
Morii, M., and Kasahara, M. New Public Key Cryptosystem Using Discrete Logarithms over GF(p). Trans. of the IEICE J71-D, 2 (Feb. 1988), 448-453 (In Japanese).
-
(1988)
New Public Key Cryptosystem Using Discrete Logarithms over Gf(P)
, vol.2
, pp. 448-453
-
-
Morii, M.1
Kasahara, M.2
-
33
-
-
0021466998
-
Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir’s fast signature scheme
-
Odlyzko, A. M. Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir’s fast signature scheme. IEEE Trans. on Information Theory IT-30 (1984), 594-601.
-
(1984)
IEEE Trans. on Information Theory IT-30
, pp. 594-601
-
-
Odlyzko, A.M.1
-
35
-
-
0012619683
-
A Multiple-Iterated Trapdoor for Dense Compact Knapsacks
-
Orton, G. A Multiple-Iterated Trapdoor for Dense Compact Knapsacks. In Advances in Cryptology-EUROCRYPT’94 (1994), pp. 112-130.
-
(1994)
In Advances in Cryptology-EUROCRYPT’94
, pp. 112-130
-
-
Orton, G.1
-
36
-
-
0009452048
-
Attacking the Chor-Rivest cryptosystem by improved lattice reduction
-
Schnorr, C. P., and Hörner, H. H. Attacking the Chor-Rivest cryptosystem by improved lattice reduction. In Guillou and Quisquater [26], pp. 1-12.
-
Guillou and Quisquater
, Issue.26
, pp. 1-12
-
-
Schnorr, C.P.1
Hörner, H.H.2
-
37
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Oct
-
Shor, P. W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 5 (Oct. 1997), 1484-1509.
-
(1997)
SIAM J. Comput
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
38
-
-
0009438294
-
On the power of quantum computation
-
Oct
-
Simon, D. R. On the power of quantum computation. SIAM J. Comput. 26, 5 (Oct. 1997), 1474-1483.
-
(1997)
SIAM J. Comput
, vol.26
, Issue.5
, pp. 1474-1483
-
-
Simon, D.R.1
-
39
-
-
84957701870
-
Cryptanalysis of the Chor-Rivest cryptosystem
-
Vaudenay, S. Cryptanalysis of the Chor-Rivest cryptosystem. In Advances in Cryptology-CRYPTO’98 (1998), pp. 243-256.
-
(1998)
In Advances in Cryptology-CRYPTO’98
, pp. 243-256
-
-
Vaudenay, S.1
|