Cryptography Reference
In-Depth Information
[10] B. Barak, R. Canetti, and J. Nielsen, “Universally composable protocols with
relaxed set-up assumptions,” in
45th IEEE Symposium on Foundations of
Computer Science
, pp. 186-195, 2004.
[11] B. Barak and O. Goldreich, “17th ieee conference on computational complex-
ity,” in
Universal arguments and their applications
, pp. 194-203, 2002.
[12] B. Barak and Y. Lindell, “Strict polynomial-time in simulation and extrac-
tion,”
SIAM Journal on Computing
, vol. 33(4), pp. 783-818, 2004.
[13] D. Beaver,
Foundations of secure interactive computing
. Vol. 576, Springer-
Verlag, 1991.
Crypto91
, Lecture Notes in Computer Science.
[14] D. Beaver, “Secure multi-party protocols and zero-knowledge proof systems
tolerating a faulty minority,”
Journal of Cryptology
, vol. 4, pp. 75-122, 1991.
[15] D. Beaver, S. Micali, and P. Rogaway, “The round complexity of secure pro-
tocols,” in
22nd ACM Symposium on the Theory of Computing
, pp. 503-513,
1990. See details in (113).
[16] M. Bellare, “Electronic commerce and electronic payments,” Webpage of a
course. http://www-cse.ucsd.edu/users/mihir/cse291-00/.
[17] M. Bellare, R. Canetti, and R. Krawczyk,
Keying hash functions for mes-
sage authentication
. Vol. 1109, Springer, 1996.
Crypto96
Lecture Notes in
Computer Science.
[18] M. Bellare, R. Canetti, and R. Krawczyk, “A modular approach to the design
and analysis of authentication and key-exchange protocols,” in
30th ACM
Symposium on the Theory of Computing
, pp. 419-428, 1998.
[19] M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway,
Relations among
notions of security for public-key encryption schemes
.
Vol. 1462, Springer,
1998.
Crypto98
Lecture Notes in Computer Science.
[20] M. Bellare and O. Goldreich,
On defining proofs of knowledge
. Vol. 740,
Springer-Verlag, 1992.
Crypto92
Lecture Notes in Computer Science.
[21] M. Bellare, R. Impagliazzo, and M. Naor, “Does parallel repetition lower
the error in computationally sound protocols?,” in
38th IEEE Symposium
on Foundations of Computer Science
, pp. 374-383, 1997.
[22] M. Bellare and P. Rogaway, “Random oracles are practical: a paradigm for
designing ecient protocols,” in
1st Conf. on Computer and Communications
Security
, pp. 62-73, 1993.
[23] M. Ben-Or, R. Canetti, and O. Goldreich, “Asynchronous secure computa-
tion,” in
25th ACM Symposium on the Theory of Computing
. See details in
(35).
[24] M. Ben-Or, O. Goldreich, S. Goldwasser, J. H astad, J. Kilian, S. Micali,
and P. Rogaway,
Everything provable is probable in zero-knowledge
. Vol. 403,
Springer-Verlag, 1990.
Crypto88
Lecture Notes in Computer Science.
[25] M. Ben-Or, S. Goldwasser, and A. Wigderson, “Completeness theorems
for non-cryptographic fault-tolerant distributed computation,” in
20th ACM
Symposium on the Theory of Computing
, pp. 1-10, 1988.
[26] M. Ben-Or, B. Kelmer, and T. Rabin, “Asynchronous secure computations
with optimal resilience,” in
13th ACM Symposium on Principles of Distributed
Computing
, pp. 183-192, 1994.