Cryptography Reference
In-Depth Information
[76] U. Feige, D. Lapidot, and A. Shamir. Multiple Non-Interactive Zero-Knowledge Proofs
under General Assumptions. SIAM Journal on Computing , Vol. 29, No. 1, pages 1-28,
1999.
[77] U. Feige and A. Shamir. Zero-Knowledge Proofs of Knowledge in Two Rounds. In
Crypto89 , Springer-Verlag Lecture Notes in Computer Science (Vol. 435), pages 526-
544, 1990.
[78] U. Feige and A. Shamir. Witness Indistinguishability and Witness Hiding Protocols. In
22nd ACM Symposium on the Theory of Computing , pages 416-426, 1990.
[79] W. Feller. An Introduction to Probability Theory and Its Applications . Wiley, New York,
1968.
[80] A. Fiat and A. Shamir. How to Prove Yourself: Practical Solution to Identification and
Signature Problems. In Crypto86 , Springer-Verlag Lecture Notes in Computer Science
(Vol. 263), pages 186-189, 1987.
[81] M. Fischer, S. Micali, C. Rackoff, and D.K. Wittenberg. An Oblivious Transfer Protocol
Equivalent to Factoring. Unpublished manuscript, 1986. (Preliminary versions were pre-
sented in EuroCrypt84 and in the NSF Workshop on Mathematical Theory of Security ,
Endicott House (1985).)
[82] R. Fischlin and C.P. Schnorr. Stronger Security Proofs for RSA and Rabin Bits. In
EuroCrypt97 , Springer-Verlag Lecture Notes in Computer Science (Vol. 1233), pages
267-279, 1997.
[83] L. Fortnow. The Complexity of Perfect Zero-Knowledge. In 19th ACM Symposium on the
Theory of Computing , pages 204-209, 1987.
[84] A.M. Frieze, J. Hastad, R. Kannan, J.C. Lagarias, and A. Shamir. Reconstructing Truncated
Integer Variables Satisfying Linear Congruences. SIAM Journal on Computing , Vol. 17,
pages 262-280, 1988.
[85] O. Gaber and Z. Galil. Explicit Constructions of Linear Size Superconcentrators. Journal
of Computer and System Science , Vol. 22, pages 407-420, 1981.
[86] M.R. Garey and D.S. Johnson. Computers and Intractability: A Guide to the Theory of
NP-Completeness . Freeman, San Francisco, 1979.
[87] P.S. Gemmell. An Introduction to Threshold Cryptography. In CryptoBytes (RSA Labo-
ratories), Vol. 2, No. 3, 1997.
[88] R. Gennaro and L. Trevisan. Lower Bounds on the Efficiency of Generic Cryptographic
Constructions. ECCC , TR00-022, May 2000.
[89] O. Goldreich. Two Remarks Concerning the GMR Signature Scheme. In Crypto86 ,
Springer-Verlag
Lecture
Notes
in
Computer
Science
(Vol.
263),
pages
104-110,
1987.
[90] O. Goldreich. Towards a Theory of Software Protection and Simulation by Oblivious
RAMs. In 19th ACM Symposium on the Theory of Computing , pages 182-194, 1987.
[91] O. Goldreich. Foundation of Cryptography - Class Notes . Preprint, spring 1989. (Super-
seded by the current topic in conjunction with [92].)
[92] O. Goldreich. Lecture Notes on Encryption, Signatures and Cryptographic Protocol .
(Extracts from [91]. Available from http://theory.lcs.mit.edu/ oded/
ln89.html. Superseded by the combination of [99], [100], and [98].)
[93] O. Goldreich. A Note on Computational Indistinguishability. Information Processing Let-
ters , Vol. 34, May, pages 277-281, 1990.
[94] O. Goldreich. A Uniform Complexity Treatment of Encryption and Zero-Knowledge.
Journal of Cryptology , Vol. 6, No. 1, pages 21-53, 1993.
[95] O. Goldreich. Foundation of Cryptography - Fragments of a Topic . February 1995. (Avail-
able from http://theory.lcs.mit.edu/
oded/frag.html. Superseded by the
current topic in conjunction with [99].)
Search WWH ::




Custom Search