Cryptography Reference
In-Depth Information
[117] O. Goldreich, R. Rubinfeld, and M. Sudan. Learning Polynomials with Queries: The
Highly Noisy Case. To appear in SIAM Journal on Discrete Mathematics .
[118] O. Goldreich, A. Sahai, and S. Vadhan. Honest-Verifier Statistical Zero-Knowledge Equals
General Statistical Zero-Knowledge. In 30th ACM Symposium on the Theory of Comput-
ing , pages 399-408, 1998.
[119] O. Goldreich and M. Sudan. Computational Indistinguishability: A Sample Hierarchy.
Journal of Computer and System Science , Vol. 59, pages 253-269, 1999.
[120] O. Goldreich and S. Vadhan. Comparing Entropies in Statistical Zero-Knowledge with
Applications to the Structure of SZK. In 14th IEEE Conference on Computational Com-
plexity , pages 54-73, 1999.
[121] S. Goldwasser and J. Kilian. Primality Testing Using Elliptic Curves. Journal of the ACM ,
Vol. 46, pages 450-472, 1999. (Preliminary version in 18th ACM Symposium on the Theory
of Computing , 1986.)
[122] S. Goldwasser and L.A. Levin. Fair Computation of General Functions in Presence of
Immoral Majority. In Crypto90 , Springer-Verlag Lecture Notes in Computer Science
(Vol. 537), pages 77-93, 1991.
[123] S. Goldwasser and S. Micali. Probabilistic Encryption. Journal of Computer and Sys-
tem Science , Vol. 28, No. 2, pages 270-299, 1984. (Preliminary version in 14th ACM
Symposium on the Theory of Computing , 1982.)
[124] S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive
Proof Systems. SIAM Journal on Computing , Vol. 18, pages 186-208, 1989. (Preliminary
version in 17th ACM Symposium on the Theory of Computing , 1985.)
[125] S. Goldwasser, S. Micali, and R.L. Rivest. A Digital Signature Scheme Secure Against
Adaptive Chosen-Message Attacks. SIAM Journal on Computing , April, pages 281-308,
1988.
[126] S. Goldwasser, S. Micali, and P. Tong. Why and How to Establish a Private Code
in a Public Network. In 23rd IEEE Symposium on Foundations of Computer Science ,
pages 134-144, 1982.
[127] S. Goldwasser, S. Micali, and A.C. Yao. Strong Signature Schemes. In 15th ACM Sympo-
sium on the Theory of Computing , pages 431-439, 1983.
[128] S. Goldwasser and M. Sipser. Private Coins versus Public Coins in Interactive Proof
Systems. Advances in Computing Research: A Research Annual , Vol. 5 ( Randomness and
Computation , S. Micali, ed.), pages 73-90, 1989.
[129] J. Hastad, R. Impagliazzo, L.A. Levin, and M. Luby. Construction of a Pseudorandom
Generator from Any One-Way Function. SIAM Journal on Computing , Vol. 28, No. 4,
pages 1364-1396, 1999. (Preliminary versions by Impagliazzo et al. in 21st ACM Sym-
posium on the Theory of Computing (1989) and Hastad in 22nd ACM Symposium on the
Theory of Computing (1990).)
[130] J. Hastad, A. Schrift, and A. Shamir. The Discrete Logarithm Modulo a Composite
Hides O ( n ) Bits. Journal of Computer and System Science , Vol. 47, pages 376 - 404,
1993.
[131] R. Impagliazzo and M. Luby. One-Way Functions are Essential for Complexity
Based Cryptography. In 30th IEEE Symposium on Foundations of Computer Science ,
pages 230 -235, 1989.
[132] R. Impagliazzo and M. Naor. Efficient Cryptographic Schemes Provable as Secure as
Subset Sum. Journal of Cryptology , Vol. 9, pages 199-216, 1996.
[133] R. Impagliazzo and S. Rudich. Limits on the Provable Consequences of One-Way Permu-
tations. In 21st ACM Symposium on the Theory of Computing , pages 44-61, 1989.
[134] R.
Impagliazzo
and
A.
Wigderson.
P
=
BPP
if
E
Requires
Exponential
Circuits:
Search WWH ::




Custom Search