Tài liệu tham khảo |
Loại |
Chi tiết |
1. Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, Chicago, Illinois, 2–4 May 1988 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing |
|
7. M. Blum and S. Goldwasser. An efficient probabilistic public key encryption scheme which hides all partial information. In G. R. Blakley and David Chaum, editors, Advances in Cryptology: Proceedings of Crypto ’84, pages 289–302, Berlin, 1985.Springer-Verlag. Lecture Notes in Computer Science Volume 196 |
Sách, tạp chí |
Tiêu đề: |
Advances in Cryptology: Proceedings of Crypto ’84 |
|
9. Ran Canetti, Uri Feige, Oded Goldreich, and Moni Naor. Adaptively secure multi- party computation. In Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, pages 639–648, Philadelphia, Pennsylvania, 22–24 May 1996 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the Twenty-Eighth Annual ACM Symposiumon the Theory of Computing |
|
12. Alfredo De Santis and Giuseppe Persiano. Zero-knowledge proofs of knowledge without interaction (extended abstract). In 33rd Annual Symposium on Founda- tions of Computer Science, pages 427–436, Pittsburgh, Pennsylvania, 24–27 Octo- ber 1992. IEEE |
Sách, tạp chí |
Tiêu đề: |
33rd Annual Symposium on Founda-tions of Computer Science |
|
13. Oded Goldreich, Russell Impagliazzo, Leonid Levin, Ramarathnam Venkatesan, and David Zuckerman. Security preserving amplification of hardness. In 31st Annual Symposium on Foundations of Computer Science, volume I, pages 318– |
Sách, tạp chí |
Tiêu đề: |
31stAnnual Symposium on Foundations of Computer Science |
|
14. Oded Goldreich, Silvio Micali, and Avi Wigderson. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design (extended abstract). In 27th Annual Symposium on Foundations of Computer Science, pages 174–187, Toronto, Ontario, Canada, 27–29 October 1986. IEEE |
Sách, tạp chí |
Tiêu đề: |
27th Annual Symposium on Foundations of Computer Science |
|
15. Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pages 218–229, New York City, 25–27 May 1987 |
Sách, tạp chí |
Tiêu đề: |
Proceedings ofthe Nineteenth Annual ACM Symposium on Theory of Computing |
|
16. IEEE. 23rd Annual Symposium on Foundations of Computer Science, Chicago, Illinois, 3–5 November 1982 |
Sách, tạp chí |
Tiêu đề: |
23rd Annual Symposium on Foundations of Computer Science |
|
17. Stanislaw Jarecki and Anna Lysyanskaya. Adaptively secure threshold cryptogra- phy: introducing concurrency, removing erasures. In Bart Preneel, editor, Advances in Cryptology - EuroCrypt 2000, pages 221–242, Berlin, 2000. Springer-Verlag. Lec- ture Notes in Computer Science Volume 1807 |
Sách, tạp chí |
Tiêu đề: |
Advancesin Cryptology - EuroCrypt 2000 |
|
19. S. Micali and P. Rogaway. Secure computation. In Joan Feigenbaum, editor, Advances in Cryptology - Crypto ’91, pages 392–404, Berlin, 1991. Springer-Verlag.Lecture Notes in Computer Science Volume 576 |
Sách, tạp chí |
Tiêu đề: |
Advances in Cryptology - Crypto ’91 |
|
20. Andrew C. Yao. Protocols for secure computations (extended abstract). In 23rd Annual Symposium on Foundations of Computer Science [16], pages 160–164 |
Sách, tạp chí |
Tiêu đề: |
23rdAnnual Symposium on Foundations of Computer Science |
|
21. Andrew C. Yao. Theory and applications of trapdoor functions (extended ab- stract). In 23rd Annual Symposium on Foundations of Computer Science [16], pages 80–91 |
Sách, tạp chí |
Tiêu đề: |
23rd Annual Symposium on Foundations of Computer Science |
|
6. Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract).In ACM [1], pages 1–10 |
Khác |
|
8. Ran Canetti. Security and composition of multi-party cryptographic protocols |
Khác |
|
10. David Chaum, Claude Cr´epeau, and Ivan Damg˚ard. Multiparty unconditionally secure protocols (extended abstract). In ACM [1], pages 11–19 |
Khác |
|
11. Ivan B. Damg˚ard and Jesper Buus Nielsen. Improved non-committing encryp- tion schemes based on a general complexity assumption. Research Series RS-00-6, BRICS, Department of Computer Science, University of Aarhus, March 2000 |
Khác |
|
18. D. E. Knuth and L. Trabb Pardo. Analysis of a simple factorization algorithm |
Khác |
|