Efficient Card-Based Protocols for Generating a Hidden Random Permutation Without Fixed Points
暂无分享,去创建一个
[1] Anton Stiglic. Computations with a deck of cards , 2001, Theor. Comput. Sci..
[2] Michael J. Fischer,et al. Bounds on secret key exchange using a random deal of cards , 2004, Journal of Cryptology.
[3] Takaaki Mizuki,et al. Six-Card Secure AND and Four-Card Secure XOR , 2009, FAW.
[4] Takaaki Mizuki,et al. Securely computing XOR with 10 cards , 2006, Australas. J Comb..
[5] Takaaki Mizuki,et al. Securely Computing the Three-Input Majority Function with Eight Cards , 2013, TPNC.
[6] Fernando Soler-Toscano,et al. A colouring protocol for the generalized Russian cards problem , 2012, Theor. Comput. Sci..
[7] Yu-ichi Hayashi,et al. Card-Based Protocols for Any Boolean Function , 2015, TAMC.
[8] Valtteri Niemi,et al. Secure Multiparty Computations Without Computers , 1998, Theor. Comput. Sci..
[9] Bert den Boer. More Efficient Match-Making and Satisfiability: The Five Card Trick , 1990, EUROCRYPT.
[10] Joe Kilian,et al. Discreet Solitary Games , 1994, CRYPTO.
[11] Chen Yang,et al. Unconditional secure communication: a Russian Cards protocol , 2010, J. Comb. Optim..
[12] Douglas R. Stinson,et al. Combinatorial solutions providing improved security for the generalized Russian cards problem , 2012, Des. Codes Cryptogr..
[13] Takaaki Mizuki,et al. Voting with a Logarithmic Number of Cards , 2013, UCNC.
[14] Takaaki Mizuki,et al. The Five-Card Trick Can Be Done with Four Cards , 2012, ASIACRYPT.