-
1
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences Of Pseudo-Random Bits
-
FOCS
-
Blum M., and S. Micali “How to Generate Cryptographically Strong Sequences Of Pseudo-Random Bits” SIAM J. on Computing, Vol 13, 1984, pp. 850-864, FOCS 1982.
-
(1984)
SIAM J. On Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
2
-
-
85028928858
-
How to Sign Given Any Trapdoor Function
-
Bellare, M., and S. Micali “How to Sign Given Any Trapdoor Function” STOC 88.
-
STOC 88
-
-
Bellare, M.1
Micali, S.2
-
5
-
-
85032877754
-
New Paradigms for digital signatures and Message Authentication based on Non-Interactive Zero Knowledge Proofs
-
M. Bellare, S. Goldwasser “New Paradigms for digital signatures and Message Authentication based on Non-Interactive Zero Knowledge Proofs” Crypto 89 proceedings, pp. 194-211
-
Crypto 89 Proceedings
, pp. 194-211
-
-
Bellare, M.1
Goldwasser, S.2
-
6
-
-
85028752821
-
Certifying Cryptographic Tools: The Case of Trapdoor Permutations
-
Bellare, Yung, “Certifying Cryptographic Tools: The Case of Trapdoor Permutations” CRYPTO-92 proceedings.
-
CRYPTO-92 Proceedings
-
-
Bellare, Y.1
-
9
-
-
0017018484
-
New directions in cryptography
-
W. Diffie, M. Heilman, “New directions in cryptography”, IEEE Trans, on Inf. Theory, IT-22, pp. 644-654, 1976.
-
(1976)
IEEE Trans, on Inf. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Heilman, M.2
-
13
-
-
0022793132
-
How to Construct Random Functions
-
October
-
Goldreich O., S. Goldwasser and S. Micali “How to Construct Random Functions” JASM V. 33 No 4. (October 1986) pp. 792-807.
-
(1986)
JASM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
14
-
-
0024868772
-
A Hard-Core Predicate for all One-Way Functions
-
Goldreich, O., and L. Levin “A Hard-Core Predicate for all One-Way Functions” Proc. 21st STOC, 1989, pp.25-32.
-
(1989)
Proc. 21St STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.2
-
15
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof-Systems
-
(also in STOC 85, pp. 291-304.)
-
S. Goldwasser, S. Micali and C. Rackoff, “The Knowledge Complexity of Interactive Proof-Systems”, SIAM J. Comput. 18 (1989), pp. 186-208; (also in STOC 85, pp. 291-304.)
-
(1989)
SIAM J. Comput
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
16
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
April
-
Goldwasser, S., S. Micali and R. Rivest “A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks” SIAM Journal of Computing vol 17, No 2, (April 1988), pp. 281-308.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
18
-
-
84969331532
-
Pseudo-Random Generators under Uniform Assumptions
-
Hastad, J., “Pseudo-Random Generators under Uniform Assumptions”, STOC 90.
-
STOC 90
-
-
Hastad, J.1
-
19
-
-
85029660870
-
One-way Functions are Essential for Complexity-Based Cryptography
-
R. Impagliazzo and M. Luby, "One-way Functions are Essential for Complexity-Based Cryptography” FOCS 89.
-
FOCS 89
-
-
Impagliazzo, R.1
Luby, M.2
-
23
-
-
84949044492
-
Bit Commitment Using Pseudo-Randomness
-
M. Naor “Bit Commitment Using Pseudo-Randomness”, Crypto-89.
-
Crypto-89
-
-
Naor, M.1
-
24
-
-
84974533327
-
Universal One-Way Hash Functions and their Cryptographic Applications
-
M. Naor and M. Yung, “Universal One-Way Hash Functions and their Cryptographic Applications”, STOC 89.
-
STOC 89
-
-
Naor, M.1
Yung, M.2
-
26
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
-
Rivest, R.L., Shamir, A. and Adleman, L., “A Method for Obtaining Digital Signatures and Public Key Cryptosystems” Comm.' ACM, Vol 21, No 2.1978.
-
(1978)
Comm.' ACM
, vol.21
, Issue.2
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
27
-
-
85028942737
-
One-way Functions sire Necessary and Sufficient for Secure Signatures
-
J. Rompel “One-way Functions sire Necessary and Sufficient for Secure Signatures” STOC 90.
-
STOC 90
-
-
Rompel, J.1
|