참고문헌
- M. Naor, R. Ostrovsky. R. Venkatesan. and M. Yung, 'Perfect sero-knowledge arguments for NP using any one-way function', Journal of Cryptology, 11(2), pp. 87-108, 1998. Preliminary version presented at CRYPTO '92
-
I. Damg
$\aa$ rd, 'Interactive hashing can simplify zero-knowledge protocol design without computational assumtions', In Advances in Cryptology - CRYPTO '93, pp. 100-109, 1993 -
I. Damg
$\aa$ rd and R. Cramer, 'On monotone function closure of perfect and statistical zero-knowledge', CWI technical report, CS-R9618. May 1996 - R. Ostrovsky, R. Venkatesan, and M. Yung, 'Fair games against an all-powerful adversary', SEQUENCES '91, Positano, 1991
- R. Ostrovsky, R. Venkatesan, and M. Yung, 'Interactive hashing simplifies zero-knowledge protocol design', In Advances in Cryptology - EUROCYRPTO '93. pp. 267-273. 1993
- C. Cachin, C. Crepeau, and J. Marcil, 'Oblivious tranfser with a memory-bounded receiver', In Proc. 39th IEEE Symposium in Foundations of Computer Science. pp. 493-502, 1998
- Y. Z. Ding, 'Oblivious Transfer in the Bounded Storage Model', In Advances in Cryptology - CRYPTO 2001, pp. 155-170, 2001
- D. R. Stinson, 'Universal hash families and the leftover hash lemma, and appli-cations to cryptography and computing', 2002
- J. L. Carter and M. N. Wegman, 'Universal classes of hash functions', Journal of Computer and System Sciences 18, pp. 143-154, 1979 https://doi.org/10.1016/0022-0000(79)90044-8
- D. R. Stinson, 'Qn the connections between universal hasing, combinatorial designs and error-correcting codes', Congressus Numerantium 114, pp. y-27, 1996