Oblivious transfer with a memory-bounded receiver
- 27 November 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 16, 493-502
- https://doi.org/10.1109/sfcs.1998.743500
Abstract
No abstract availableThis publication has 28 references indexed in Scilit:
- Perfect Zero-Knowledge Arguments for NP Using Any One-Way PermutationJournal of Cryptology, 1998
- Unconditional security against memory-bounded adversariesPublished by Springer Nature ,1997
- Simulating BPP using a general weak random sourceAlgorithmica, 1996
- Committed Oblivious Transfer and Private Multi-Party ComputationPublished by Springer Nature ,1995
- Generalized privacy amplificationIEEE Transactions on Information Theory, 1995
- Quantum Oblivious TransferJournal of Modern Optics, 1994
- Privacy Amplification by Public DiscussionSIAM Journal on Computing, 1988
- A randomized protocol for signing contractsCommunications of the ACM, 1985
- Conjugate codingACM SIGACT News, 1983
- Enumerative source encodingIEEE Transactions on Information Theory, 1973