<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Modern Cryptography, Probabilistic Proofs and Pseudorandomness</style></title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer-Verlag</style></publisher><pub-location><style face="normal" font="default" size="100%">Berlin</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oded Goldreich</style></author><author><style face="normal" font="default" size="100%">Rafail Ostrovsky</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Software Protection and Simulation on Oblivious RAMs</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of the ACM</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1996</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 1996</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">431-473</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Benny Chor</style></author><author><style face="normal" font="default" size="100%">Oded Goldreich</style></author><author><style face="normal" font="default" size="100%">Eyal Kushilevitz</style></author><author><style face="normal" font="default" size="100%">Madhu Sudan</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Private Information Retrieval</style></title><secondary-title><style face="normal" font="default" size="100%">36th Annual IEEE Symposium on Foundations of Computer Science</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1995</style></year></dates><pub-location><style face="normal" font="default" size="100%">USA</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Shimon Even</style></author><author><style face="normal" font="default" size="100%">Oded Goldreich</style></author><author><style face="normal" font="default" size="100%">Abraham Lempel</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Randomized Protocol for Signing Contracts</style></title><secondary-title><style face="normal" font="default" size="100%">A Randomized Protocol for Signing Contracts</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1985</style></year></dates><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">637-647</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">6</style></issue></record></records></xml>