Cryptography Reference
In-Depth Information
19. Okamoto, T., Tanaka, K., Uchiyama, S.: Quantum Public-Key Cryptosystems. In:
Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, p. 147. Springer, Heidelberg
(2000)
20. Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and Sys-
tems Sciences 28(2), 270-299 (1984)
21. Wegman, M.N., Lawrence Carter, J.: New hash functions and their use in authen-
tication and set equality, pp. 265-279 (1981)
22. Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic
applications. In: Proceedings of the 21st Annual ACM Symposium on Theory of
Computing (1989)
23. Rompel, J.: One-way functions are necessary and sucient for secure signatures.
In: STOC 1990: Proceedings of the Twenty-Second Annual ACM Symposium on
Theory of Computing (1990)
24. Renner, R.: Security of quantum key distribution. PhD thesis, Swiss Federal Insti-
tute of Technology (2005)
25. Bernstein, D.J., Buchmann, J., Dahmen, E.: Post Quantum Cryptography (2008)
26. Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity
or all languages in np have zeroknowledge proofs. Journal of the ACM (1991)
27. Impagliazzo, R., Rudich, S.: Limits on the Provable Consequences of One-Way
Permutations. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 8-26.
Springer, Heidelberg (1990)
28. Cachin, C., Maurer, U.M.: Unconditional Security Against Memory-Bounded Ad-
versaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 292-306.
Springer, Heidelberg (1997)
29. Ding, Y.Z., Rabin, M.O.: Hyper-Encryption and Everlasting Security. In: Alt, H.,
Ferreira, A. (eds.) STACS 2002. LNCS, vol. 2285, pp. 1-26. Springer, Heidelberg
(2002)
30. Adams, C., Lloyd, S.:
31. Rivest, R.L.: Cryptography. In: Handbook of Theoretical Computer Science, pp.
717-755. Elsevier (1990)
32. Gertner, Y., Malkin, T., Reingold, O.: On the impossibility of basing trapdoor
functions on trapdoor predicates. In: IEEE Press (ed.) Proc. 42nd Annual IEEE
Symposium on the Foundations of Computer Science (FOCS 2001), pp. 126-135
(2001)
33. Beaver, D.: On Deniability in Quantum Key Exchange. In: Knudsen, L.R. (ed.)
EUROCRYPT 2002. LNCS, vol. 2332, pp. 352-367. Springer, Heidelberg (2002)
34. Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable Encryption. In: Kaliski
Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90-104. Springer, Heidelberg
(1997)
35. Klonowski, M., Kubiak, P., Kutylowski, M.: Practical Deniable Encryption. In:
Geffert, V., Karhumaki, J., Bertoni, A., Preneel, B., Navrat, P., Bielikova, M.
(eds.) SOFSEM 2008. LNCS, vol. 4910, pp. 599-609. Springer, Heidelberg (2008)
36. Childs, A., Jao, D., Soukharev, V.: Constructing elliptic curve isogenies in quantum
subexponential time (2010) (in preparation)
 
Search WWH ::




Custom Search