-
2
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
D. Beaver. "Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority." J. Cryptology 4:2 1991, 75-122.
-
(1991)
J. Cryptology
, vol.4
, Issue.2
, pp. 75-122
-
-
Beaver, D.1
-
3
-
-
85029542707
-
Foundations of secure interactive computing
-
Springer-Verlag LNCS 576
-
D. Beaver. "Foundations of Secure Interactive Computing." Advances in Cryptology - Crypto '91 Proceedings, Springer-Verlag LNCS 576, 1992, 377-391.
-
(1992)
Advances in Cryptology - Crypto '91 Proceedings
, pp. 377-391
-
-
Beaver, D.1
-
4
-
-
84933507780
-
Efficient multiparty protocols using circuit randomization
-
Springer-Verlag LNCS 576
-
D. Beaver. "Efficient Multiparty Protocols Using Circuit Randomization." Advances in Cryptology - Crypto '91 Proceedings, Springer-Verlag LNCS 576, 1992, 420-432.
-
(1992)
Advances in Cryptology - Crypto '91 Proceedings
, pp. 420-432
-
-
Beaver, D.1
-
7
-
-
0030679850
-
Commodity-based cryptography
-
ACM
-
th STOC, ACM, 1997, 446-455.
-
(1997)
th STOC
, pp. 446-455
-
-
Beaver, D.1
-
8
-
-
85032877753
-
Non-interactive oblivious transfer and applications
-
Springer-Verlag LNCS 435
-
M. Bellare, S. Micali. "Non-Interactive Oblivious Transfer and Applications." Advances in Cryptology - Crypto '89 Proceedings, Springer-Verlag LNCS 435, 1990, 547-557.
-
(1990)
Advances in Cryptology - Crypto '89 Proceedings
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
9
-
-
84969361843
-
Practical quantum oblivious transfer
-
Springer Verlag LNCS 576
-
C. Bennett, G. Brassard, C. Crépeau, M. Skubiszewska. "Practical Quantum Oblivious Transfer." Advances in Cryptology - Crypto '91 Proceedings, Springer Verlag LNCS 576, 1992, 351-366.
-
(1992)
Advances in Cryptology - Crypto '91 Proceedings
, pp. 351-366
-
-
Bennett, C.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, M.4
-
12
-
-
84976804419
-
How to exchange (Secret) keys
-
May
-
M. Blum. "How to Exchange (Secret) Keys." ACM Trans. Comput. Sys. 1:2 May 1983, 175-193.
-
(1983)
ACM Trans. Comput. Sys
, vol.1
, Issue.2
, pp. 175-193
-
-
Blum, M.1
-
13
-
-
0022716288
-
A simple unpredictable pseudo-random number generator
-
May
-
L. Blum, M. Blum, M. Shub. "A Simple Unpredictable Pseudo-Random Number Generator." SIAM J. on Computing 15:2 May 1986, 364-383.
-
(1986)
SIAM J. on Computing
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
17
-
-
0012610677
-
Limits on the security of coin flips when half the processors are faulty
-
ACM
-
th STOC, ACM, 1986, 364-370.
-
(1986)
th STOC
, pp. 364-370
-
-
Cleve, R.1
-
18
-
-
85030121757
-
Equivalence between two flavours of oblivious transfers
-
Springer-Verlag LNCS 293
-
C. Crépeau. "Equivalence Between Two Flavours of Oblivious Transfers." Advances in Cryptology - Crypto '87 Proceedings, Springer-Verlag LNCS 293, 1988, 350-354.
-
(1988)
Advances in Cryptology - Crypto '87 Proceedings
, pp. 350-354
-
-
Crépeau, C.1
-
19
-
-
85029211337
-
Efficient cryptographic protocols based on noisy channels
-
April 9
-
C. Crépeau. "Efficient Cryptographic Protocols Based on Noisy Channels." Manuscript, April 9, 1996.
-
(1996)
Manuscript
-
-
Crépeau, C.1
-
20
-
-
0024132071
-
Achieving oblivious transfer using weakened security assumptions
-
IEEE
-
th FOCS, IEEE, 1988, 42-52.
-
(1988)
th FOCS
, pp. 42-52
-
-
Crépeau, C.1
Kitian, J.2
-
22
-
-
84976810569
-
Reaching agreement in the presence of faults
-
M. Pease, R. Shostak, L. Lamport. "Reaching Agreement in the Presence of Faults." JACM 27:2, 1980, 228-234.
-
(1980)
JACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
23
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, A. Lempel. "A Randomized Protocol for Signing Contracts." Comm. of the ACM 28:6, 1985, 637-647.
-
(1985)
Comm. of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
24
-
-
0024135240
-
Zero knowledge proofs of identity
-
U. Feige, A. Fiat, A. Shamir. "Zero Knowledge Proofs of Identity." J. Cryptology 1:2, 1988, 77-94.
-
(1988)
J. Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
25
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, C. Rackoff. "The Knowledge Complexity of Interactive Proof Systems." SIAM J. on Computing 18:1, 1989, 186-208.
-
(1989)
SIAM J. on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
29
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
ACM, 1988
-
th STOC, ACM, 1988, 1988, 20-29.
-
(1988)
th STOC
, pp. 20-29
-
-
Kilian, J.1
-
30
-
-
0020271558
-
Inferring a sequence generated by a linear congruence
-
IEEE
-
rd FOCS, IEEE, 1982, 153-159.
-
(1982)
rd FOCS
, pp. 153-159
-
-
Plumstead, J.1
-
33
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
ACM
-
st STOC, ACM, 1989, 73-85.
-
(1989)
st STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
34
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. Saltzer, M. Schroeder. "The Protection of Information in Computer Systems." Proc. IEEE 63:9, September 1975, 1278-130.
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
, pp. 1130-1278
-
-
Saltzer, J.1
Schroeder, M.2
-
35
-
-
0018545449
-
How to share a secret
-
A. Shamir. "How to Share a Secret." Communications of the ACM, 22,1979, 612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
36
-
-
0023568495
-
Random self-reducibility and zero-knowledge proofs of possession of information
-
IEEE
-
th FOCS, IEEE, 1987, 472-482.
-
(1987)
th FOCS
, pp. 472-482
-
-
Tompa, M.1
Woll, H.2
-
37
-
-
0020312165
-
Protocols for secure computations
-
IEEE
-
rd FOCS, IEEE, 1982, 160-164.
-
(1982)
rd FOCS
, pp. 160-164
-
-
Yao, A.1
|