Studies in secure multiparty computation and applications
暂无分享,去创建一个
[1] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[2] Silvio Micali,et al. An Optimal Algorithm for Synchronous Byzantine Agreement , 1997 .
[3] Cliff Stoll. How secure are computers in the U.S.A.?: An analysis of a series of attacks on Milnet computers , 1988, Comput. Secur..
[4] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[5] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[6] Silvio Micali,et al. Byzantine agreement in constant expected time , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[7] J. Edmonds. Paths, Trees, and Flowers , 1965, Canadian Journal of Mathematics.
[8] Alfredo De Santis,et al. Zero-knowledge proofs of knowledge without interaction , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.
[9] Jon A. Rochlis,et al. With microscope and tweezers: an analysis of the Internet virus of November 1988 , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[10] Michael O. Rabin,et al. Randomized byzantine generals , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[11] E. Eugene Schultz,et al. Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code , 1993, Comput. Secur..
[12] Gabriel Bracha,et al. An asynchronous [(n - 1)/3]-resilient consensus protocol , 1984, PODC '84.
[13] Ran Canetti,et al. How to Maintain Authenticated Communication in the Presence of Break-ins , 1996 .
[14] Oded Goldreich,et al. Foundations of Cryptography (Fragments of a Book) , 1995 .
[15] Eric Bach,et al. How to Generate Factored Random Numbers , 1988, SIAM J. Comput..
[16] Leonid A. Levin,et al. Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.
[17] Silvio Micali,et al. On the Cryptographic Applications of Random Functions , 1984, CRYPTO.
[18] Cynthia Dwork,et al. Randomization in Byzantine Agreement , 1989, Adv. Comput. Res..
[19] Josh Benaloh,et al. Receipt-Free Secret-Ballot Elections , 1994, STOC 1994.
[20] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[21] Russell Impagliazzo,et al. Limits on the provable consequences of one-way permutations , 1988, STOC '89.
[22] Donald Beaver,et al. Cryptographic Protocols Provably Secure Against Dynamic Adversaries , 1992, EUROCRYPT.
[23] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[24] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[25] Rafail Ostrovsky,et al. How To Withstand Mobile Virus Attacks , 1991, PODC 1991.
[26] Kazue Sako,et al. Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth , 1995, EUROCRYPT.
[27] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[28] Baruch Awerbuch,et al. Complexity of network synchronization , 1985, JACM.
[29] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[30] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1983, PODS '83.
[31] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[32] Michael J. Fischer,et al. The Consensus Problem in Unreliable Distributed Systems (A Brief Survey) , 1983, FCT.
[33] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[34] Ran Canetti,et al. Maintaining Security in the Presence of Transient Faults , 1994, CRYPTO.
[35] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[36] Benny Chor,et al. Solvability in asynchronous environments , 1989, 30th Annual Symposium on Foundations of Computer Science.
[37] Ran Canetti,et al. Asynchronous secure computation , 1993, STOC.
[38] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[39] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[40] Rüdiger Reischuk,et al. A New Solution for the Byzantine Generals Problem , 1985, Inf. Control..
[41] Moti Yung,et al. Systematic Design of a Family of Attack-Resistant Authentication Protocols , 1993, IEEE J. Sel. Areas Commun..
[42] Adi Shamir,et al. How to share a secret , 1979, CACM.
[43] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).