Efficient Cryptographic Protocols Based on Noisy Channels
- 1 January 1997
- book chapter
- Published by Springer Nature
- p. 306-317
- https://doi.org/10.1007/3-540-69053-0_21
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Practical Quantum Oblivious TransferPublished by Springer Nature ,2001
- Committed Oblivious Transfer and Private Multi-Party ComputationPublished by Springer Nature ,1995
- Generalized privacy amplificationIEEE Transactions on Information Theory, 1995
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systemsJournal of the ACM, 1991
- Minimum disclosure proofs of knowledgeJournal of Computer and System Sciences, 1988
- Equivalence Between Two Flavours of Oblivious TransfersPublished by Springer Nature ,1988
- Conjugate codingACM SIGACT News, 1983
- Protocols for secure computationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979
- The Wire-Tap ChannelBell System Technical Journal, 1975