On the foundations of modern cryptography
- 1 January 1997
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 84 references indexed in Scilit:
- Software protection and simulation on oblivious RAMsJournal of the ACM, 1996
- Efficient Cryptographic Schemes Provably as Secure as Subset SumJournal of Cryptology, 1996
- The discrete logarithm modulo a composite hides 0(n) BitsJournal of Computer and System Sciences, 1993
- Inferring sequences produced by pseudo-random number generatorsJournal of the ACM, 1989
- Minimum disclosure proofs of knowledgeJournal of Computer and System Sciences, 1988
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- How to share a secretCommunications of the ACM, 1979
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976