On using probabilistic Turing machines to model participants in cryptographic protocols
暂无分享,去创建一个
[1] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[2] Oded Goldreich,et al. On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits , 2007, Journal of Cryptology.
[3] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[4] Michael Francis Atiyah,et al. Introduction to commutative algebra , 1969 .
[5] Eugene S. Santos,et al. Probabilistic Turing machines and computability , 1969 .
[6] M. Nivat. Theoretical Computer Science Volume 213-214 , 1999 .
[7] John T. Gill,et al. Computational complexity of probabilistic Turing machines , 1974, STOC '74.
[8] Umesh V. Vazirani,et al. Quantum Complexity Theory , 1997, SIAM J. Comput..
[9] UnruhDominique,et al. On using probabilistic Turing machines to model participants in cryptographic protocols , 2013 .
[10] Silvio Micali,et al. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).