Cryptography Reference
In-Depth Information
[78] O. Goldreich, S. Vadhan, and A. Wigderson, “On interactive proofs with a
laconic provers,” Computational Complexity , vol. 11, pp. 1-53, 2002.
[79] O. Goldreich and R. Vainish, How to solve any protocol problem - an e ciency
improvement . Vol. 293, Springer-Verlag, 1988. Crypto87 Lecture Notes in
Computer Science.
[80] S. Goldwasser and S. Micali, “Probabilistic encryption,” Journal of Computer
and System Science , vol. 28(2), pp. 270-299, 1984. Preliminary version in 14th
STOC , 1982.
[81] S. Goldwasser, S. Micali, and C. Rackoff, “The knowledge complexity of inter-
active proof systems,” SIAM Journal on Computing , vol. 18, pp. 186-208,
1989. Preliminary version in 17th STOC , 1985.
[82] S. Goldwasser, S. Micali, and R. Rivest, “A digital signature scheme secure
against adaptive chosen-message attacks,” SIAM Journal on Computing ,
pp. 281-308, 1988.
[83] S. Golomb, Shift Register Sequences . Aegean Park Press, revised edition ed.,
1982. Holden-Dat, 1967.
[84] R. Greenstadt, “Electronic voting bibliography,” 2000.
http://theory.lcs.mit.edu/ cis/voting/greenstadt-voting-bibligraphy.html.
[85] J. H astad, R. Impagliazzo, L. Levin, and M. Luby, “A pseudorandom gener-
ator from any one-way function,” SIAM Journal on Computing , vol. 28(4),
pp. 1364-1396, 1999.
[86] M. Hirt and U. Maurer, “Complete characterization of adversaries tolerable in
secure multi-party computation,” Journal of Cryptology , vol. 13(1), pp. 31-60,
2000.
[87] R. Impagliazzo, L. Levin, and M. Luby, “Pseudorandom generation from one-
way functions,” in 21st ACM Symposium on the Theory of Computing , pp. 12-
24, 1989.
[88] R. Impagliazzo and M. Yung, Direct zero-knowledge computations . Vol. 293,
Springer-Verlag, 1987. Crypto87 Lecture Notes in Computer Science.
[89] J. Katz and M. Yung, “Complete characterization of security notions for prob-
abilistic private-key encryption,” in 32nd ACM Symposium on the Theory of
Computing , pp. 245-254, 2000.
[90] J. Kilian, “A note on ecient zero-knowledge proofs and arguments,” in 24th
ACM Symposium on the Theory of Computing , pp. 723-732, 1992.
[91] J. Kilian and E. Petrank, “Concurrent and resettable zero-knowledge in poly-
logarithmic rounds,” in 33rd ACM Symposium on the Theory of Computing ,
pp. 560-569, 2001.
[92] D. Knuth, The Art of Computer Programming . Vol. 2, Addison-Wesley Pub-
lishing Company Inc, first edition ed., 1969.
[93] H. Krawczyk, LFSR-based hashing and authentication . Vol. 839, Springer-
Verlag, 1994. Crypto94 Lecture Notes in Computer Science.
[94] Y. Lindell, Parallel coin-tossing and constant-round secure two-party compu-
tation . Vol. 2139, Springer-Verlag, 2001. Crypto01 Lecture Notes in Computer
Science.
[95] Y. Lindell, A. Lysyanskaya, and T. Rabin, “On the composition of authen-
ticated byzantine agreement,” in 34th ACM Symposium on the Theory of
Computing , pp. 514-523, 2002.
Search WWH ::




Custom Search