Limits on the Provable Consequences of One-way Permutations (1989)

Cached

Download Links

by Russell Impagliazzo , Steven Rudich
Citations:162 - 0 self

Active Bibliography

32 Limits on the Provable Consequences of One-way Functions – Steven Rudich, To Nathan Congdon - 1989
7 On the Role of Definitions in and Beyond Cryptography – Phillip Rogaway - 2004
1 Cryptography in Constant Parallel Time – Benny Applebaum - 2007
1 Cryptology – Prof Ronald Rivest, L. Rivest
19 Complexity and Security of Distributed Protocols – Matthew Keith Franklin - 1993
6 On the Black-Box Complexity of Optimally-Fair Coin Tossing – Dana Dachman-soled, Yehuda Lindell, Mohammad Mahmoody
33 Finding collisions in interactive protocols – A tight lower bound on the round complexity of statistically-hiding commitments – Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev - 2007
Mathematical Foundations of Modern Cryptography: Computational Complexity Perspective – Shafi Goldwasser - 2002
33 How to Sign Given Any Trapdoor Permutation – Mihir Bellare, Silvio Micali - 1992
24 The Foundations of Modern Cryptography – Oded Goldreich - 1998
29 Randomness, Interactive Proofs and . . . – Oded Goldreich - 1987
7 Bounds on the efficiency of “blackbox” commitment schemes – Omer Horvitz, Jonathan Katz - 2005
7 Statistically Hiding Commitments and Statistical Zero-Knowledge Arguments from Any One-Way Function – Iftach Haitner, Minh-huyen Nguyen, Shien Jin Ong , Omer Reingold, Salil Vadhan - 2007
78 Efficient Cryptographic Schemes Provably as Secure as Subset Sum – Russell Impagliazzo, Moni Naor - 1993
61 Lower bounds on the Efficiency of Generic Cryptographic Constructions – Rosario Gennaro, Yael Gertner, Jonathan Katz, Luca Trevisan - 2000
10 Public Key Cryptography from Different Assumptions – Boaz Barak, Avi Wigderson - 2008
5 A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP – Iftach Haitner, Mohammad Mahmoody, David Xiao - 2009
2 Survey of Computational Assumptions Used in Cryptography Broken or Not by Shor's Algorithm – Hong Zhu - 2001
18 Efficient Electronic Cash: New Notions and Techniques – Yiannis S. Tsiounis - 1997