-
1
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds
-
J. Bar-Ilan, and D. Beaver, "Non-Cryptographic Fault-Tolerant Computing in a Constant Number of Rounds", Proc. of 8th PODC, pp. 201-209, 1989.
-
(1989)
Proc. of 8th PODC
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
3
-
-
0021370261
-
A boolean function requiring 3n network size
-
N. Blum, "A Boolean Function Requiring 3n Network Size", Theoretical Computer Science, Vol. 28, pp. 337-345, 1984.
-
(1984)
Theoretical Computer Science
, vol.28
, pp. 337-345
-
-
Blum, N.1
-
4
-
-
0000392346
-
The complexity of boolean functions
-
Chapter 14
-
R. B. Boppana, and M. Sipser, "The Complexity of Boolean Functions", in Handbook of Theoretical Computer Science, Vol. A, Chapter 14, pp. 757-804, 1990.
-
(1990)
Handbook of Theoretical Computer Science
, vol.A
, pp. 757-804
-
-
Boppana, R.B.1
Sipser, M.2
-
5
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-or, S. Goldwasser, and A. Wigderson, "Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation", Proc. of 20th STOC, pp. 1-10, 1988.
-
(1988)
Proc. of 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
84958034013
-
On the number of random bits in totally private computations
-
C. Blundo, A. De-Santis, G. Persiano, and U. Vaccaro, "On the Number of Random Bits in Totally Private Computations", Proc. of 22nd ICALP, 1995.
-
(1995)
Proc. of 22nd ICALP
-
-
Blundo, C.1
De-Santis, A.2
Persiano, G.3
Vaccaro, U.4
-
7
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crepeau, and I. Damgard, "Multiparty Unconditionally Secure Protocols", Proc. of 20th STOC, pp. 11-19, 1988.
-
(1988)
Proc. of 20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
9
-
-
0029293045
-
Private computations over the integers
-
B. Chor, M. Gereb-Graus, and E. Kushilevitz, "Private Computations Over the Integers", FOCS 90 and SIAM Jour, on Computing, Vol. 24, No. 2, pp. 376-386, 1995.
-
(1995)
FOCS 90 and SIAM Jour, on Computing
, vol.24
, Issue.2
, pp. 376-386
-
-
Chor, B.1
Gereb-Graus, M.2
Kushilevitz, E.3
-
10
-
-
0027986369
-
A minimal model for secure computation
-
U. Feige, J. Kilian, and M. Naor, "A Minimal Model for Secure Computation", Proc. of 26th STOC, pp. 554-563, 1994.
-
(1994)
Proc. of 26th STOC
, pp. 554-563
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
11
-
-
0026985378
-
Communication complexity of secure computation
-
M. Franklin, and M. Yung, "Communication Complexity of Secure Computation", Proc. of 24th STOC, pp. 699-710, 1992.
-
(1992)
Proc. of 24th STOC
, pp. 699-710
-
-
Franklin, M.1
Yung, M.2
-
12
-
-
0023545076
-
How to play any mental game
-
O. Goldreich, S. Micali, and A. Wigderson, "How to Play Any Mental Game", Proc. of 19th STOC, pp. 218-229, 1987.
-
(1987)
Proc. of 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
84968329589
-
Reducibility and completeness in multi-party private computations
-
E. Kushilevitz, S. Micali, and R. Ostrovsky, "Reducibility and Completeness in Multi-Party Private Computations", Proc. of 35th FOCS, pp. 478-489, 1994.
-
(1994)
Proc. of 35th FOCS
, pp. 478-489
-
-
Kushilevitz, E.1
Micali, S.2
Ostrovsky, R.3
-
15
-
-
0002365530
-
Privacy and communication complexity
-
E. Kushilevitz, "Privacy and Communication Complexity", FOCS 89, and SIAM Jour, on Disc. Math., Vol. 5, No. 2, pp. 273-284, 1992.
-
(1992)
FOCS 89, and SIAM Jour, on Disc. Math.
, vol.5
, Issue.2
, pp. 273-284
-
-
Kushilevitz, E.1
-
16
-
-
0040655150
-
A randomness-rounds tradeoff in private computation
-
Y. Desmedt, ed., Springer-Verlag, Lecture Notes in Computer Science
-
E. Kushilevitz, and A. Rosen, "A Randomness-Rounds Tradeoff in Private Computation", Advances in Cryptology, Proceedings of Crypto'94, Y. Desmedt, ed., Springer-Verlag, Lecture Notes in Computer Science, Vol. 839, pp. 397-410, 1994.
-
(1994)
Advances in Cryptology, Proceedings of Crypto'94
, vol.839
, pp. 397-410
-
-
Kushilevitz, E.1
Rosen, A.2
-
17
-
-
0040666550
-
A 2.5n lower bound on the combinatorial complexity of boolean functions
-
W. J. Paul, "A 2.5n Lower Bound on the Combinatorial Complexity of Boolean Functions", SIAM Jour, on Computing, Vol. 6, No. 3, pp. 427-443, 1977.
-
(1977)
SIAM Jour, on Computing
, vol.6
, Issue.3
, pp. 427-443
-
-
Paul, W.J.1
-
18
-
-
84940644968
-
A mathematical theory of communication
-
623-656
-
C. E. Shannon, "A Mathematical Theory of Communication", Bell System Tech. Jour., Vol. 27, pp. 379-423, 623-656, 1948.
-
(1948)
Bell System Tech. Jour.
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
19
-
-
0022882770
-
How to generate and exchange secrets
-
A. C. Yao, "How to Generate and Exchange Secrets", Proc. of 27th FOCS, pp. 162-167, 1986.
-
(1986)
Proc. of 27th FOCS
, pp. 162-167
-
-
Yao, A.C.1
-
20
-
-
0026170638
-
A 4n lower bound on the combinational complexity of certain symmetric boolean functions over the basis of unate dyadic boolean functions
-
U. Zwick, "A 4n Lower Bound on the Combinational Complexity of Certain Symmetric Boolean Functions over the Basis of Unate Dyadic Boolean Functions", SIAM Jour, on Computing, Vol. 20, 1991.
-
(1991)
SIAM Jour, on Computing
, vol.20
-
-
Zwick, U.1
|