1 |
D. R. Stinson, 'Qn the connections between universal hasing, combinatorial designs and error-correcting codes', Congressus Numerantium 114, pp. y-27, 1996
|
2 |
I. Damgrd and R. Cramer, 'On monotone function closure of perfect and statistical zero-knowledge', CWI technical report, CS-R9618. May 1996
|
3 |
D. R. Stinson, 'Universal hash families and the leftover hash lemma, and appli-cations to cryptography and computing', 2002
|
4 |
J. L. Carter and M. N. Wegman, 'Universal classes of hash functions', Journal of Computer and System Sciences 18, pp. 143-154, 1979
DOI
ScienceOn
|
5 |
C. Cachin, C. Crepeau, and J. Marcil, 'Oblivious tranfser with a memory-bounded receiver', In Proc. 39th IEEE Symposium in Foundations of Computer Science. pp. 493-502, 1998
|
6 |
M. Naor, R. Ostrovsky. R. Venkatesan. and M. Yung, 'Perfect sero-knowledge arguments for NP using any one-way function', Journal of Cryptology, 11(2), pp. 87-108, 1998. Preliminary version presented at CRYPTO '92
|
7 |
I. Damgrd, 'Interactive hashing can simplify zero-knowledge protocol design without computational assumtions', In Advances in Cryptology - CRYPTO '93, pp. 100-109, 1993
|
8 |
R. Ostrovsky, R. Venkatesan, and M. Yung, 'Fair games against an all-powerful adversary', SEQUENCES '91, Positano, 1991
|
9 |
Y. Z. Ding, 'Oblivious Transfer in the Bounded Storage Model', In Advances in Cryptology - CRYPTO 2001, pp. 155-170, 2001
|
10 |
R. Ostrovsky, R. Venkatesan, and M. Yung, 'Interactive hashing simplifies zero-knowledge protocol design', In Advances in Cryptology - EUROCYRPTO '93. pp. 267-273. 1993
|