Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model
暂无分享,去创建一个
[1] Rafael Hirschfeld,et al. Pseudorandom Generators and Complexity Classes , 1989, Advances in Computational Research.
[2] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[3] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[4] Joseph Y. Halpern,et al. A logic to reason about likelihood , 1983, Artif. Intell..
[5] Amos Fiat,et al. Zero Knowledge Proofs of Identity , 1987, STOC.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Manuel Blum,et al. An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information , 1985, CRYPTO.
[8] Oded Goldreich,et al. How to Solve any Protocol Problem - An Efficiency Improvement , 1987, CRYPTO.
[9] Michael O. Rabin,et al. Achieving independence in logarithmic number of rounds , 1987, PODC '87.
[10] Leonid A. Levin,et al. One-way functions and pseudorandom generators , 1985, STOC '85.
[11] Silvio Micali,et al. A Fair Protocol for Signing Contracts (Extended Abstract) , 1985, ICALP.
[12] Vijay V. Vazirani,et al. Efficient and Secure Pseudo-Random Number Generation , 1984, CRYPTO.
[13] A. Yao. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[14] Michael J. Fischer,et al. Relations Among Complexity Measures , 1979, JACM.
[15] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[16] Michael J. Fischer,et al. A robust and verifiable cryptographically secure election scheme , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[17] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[18] David A. Mix Barrington,et al. Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC¹ , 1989, J. Comput. Syst. Sci..
[19] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[20] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[21] Silvio Micali,et al. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[22] Oded Goldreich,et al. RSA/Rabin Bits are 1/2 + 1/poly(log N) Secure , 1984, FOCS.
[23] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[24] Manuel Blum. How to exchange (secret) keys , 1983, STOC '83.
[25] Adi Shamir,et al. The cryptographic security of truncated linearly related variables , 1985, STOC '85.
[26] Moti Yung,et al. A private interactive test of a boolean predicate a minimum-knowledge public-key cryptosystems , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[27] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[28] Adi Shamir,et al. How to share a secret , 1979, CACM.
[29] Nancy A. Lynch,et al. Cryptographic protocols , 1982, STOC '82.
[30] David A. Mix Barrington,et al. Bounded-width polynomial-size branching programs recognize exactly those languages in NC1 , 1986, STOC '86.
[31] Moti Yung,et al. Direct Minimum-Knowledge Computations , 1987, CRYPTO.
[32] S. Micali,et al. How To Construct Randolli Functions , 1984, FOCS 1984.
[33] Martín Abadi,et al. A Simple Protocol for Secure Circuit Evaluation , 1988, STACS.
[34] Moti Yung,et al. Distributing the power of a government to enhance the privacy of voters , 1986, PODC '86.
[35] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[36] David Chaum,et al. Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result , 1987, CRYPTO.
[37] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[38] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[39] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[40] Manuel Blum,et al. Comparison of Two Pseudo-Random Number Generators , 1982, CRYPTO.
[41] Silvio Micali,et al. How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[42] Vijay V. Vazirani,et al. Trapdoor pseudo-random number generators, with applications to protocol design , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[43] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[44] Evangelos Kranakis. Primality and cryptography , 1986, Wiley-Teubner series in computer science.