-
1
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of Rounds
-
J. Bar-Ilan and D. Beaver, Non-cryptographic fault-tolerant computing in a constant number of Rounds, in "Proc. of 8th POD, 1989," pp. 201-209.
-
Proc. of 8th POD, 1989
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
3
-
-
0021370261
-
A Boolean function requiring 3n network size
-
N. Blum, A Boolean function requiring 3n network size, Theoret. Comput. Sci. 28 (1984), 337-345.
-
(1984)
Theoret. Comput. Sci.
, vol.28
, pp. 337-345
-
-
Blum, N.1
-
4
-
-
0000392346
-
The complexity of Boolean functions
-
Chap. 14, MIT Press, Cambridge, MA
-
R. B. Boppana and M. Sipser, The complexity of Boolean functions, in "Handbook of Theoretical Computer Science," Vol. A., Chap. 14, pp. 757-804, MIT Press, Cambridge, MA, 1990.
-
(1990)
Handbook of Theoretical Computer Science
, vol.A
, pp. 757-804
-
-
Boppana, R.B.1
Sipser, M.2
-
5
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-or, S. Goldwasser, and A. Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation, in "Proc. of 20th STOC, 1988," pp. 1-10.
-
Proc. of 20th STOC, 1988
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
84958034013
-
On the number of random bits in totally private computations
-
"Proc. of 22nd ICALP, Berlin, 1995,"
-
C. Blundo, A. De-Santis, G. Persiano, and U. Vaccaro, On the number of random bits in totally private computations, in "Proc. of 22nd ICALP, Berlin, 1995," pp. 171-182. Lectures Notes in Comput. Sci., Vol. 944.
-
Lectures Notes in Comput. Sci.
, vol.944
, pp. 171-182
-
-
Blundo, C.1
De-Santis, A.2
Persiano, G.3
Vaccaro, U.4
-
7
-
-
0030652586
-
Randomness vs. fault-tolerance
-
R. Canetti, E. Kushilevitz, R. Ostrovsky, and A. Rosén, Randomness vs. fault-tolerance, in "Proc. of 16th PODC, 1997," pp. 35-44.
-
Proc. of 16th PODC, 1997
, pp. 35-44
-
-
Canetti, R.1
Kushilevitz, E.2
Ostrovsky, R.3
Rosén, A.4
-
8
-
-
84898947315
-
Multiple unconditionally secure protocols
-
D. Chaum, C. Crepeau, and I. Damgard, Multiple unconditionally secure protocols, in "Proc. of 20th STOC, 1988," pp. 11-19.
-
Proc. of 20th STOC, 1988
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
9
-
-
0002738457
-
A zero-one law for Boolean privacy
-
STOC 89
-
B. Chor and E. Kushilevitz, A zero-one law for Boolean privacy, SIAM J. Disc. Math. 4 (1991), 36-47; STOC 89.
-
(1991)
SIAM J. Disc. Math.
, vol.4
, pp. 36-47
-
-
Chor, B.1
Kushilevitz, E.2
-
10
-
-
0029293045
-
Private computations over the integers
-
FOCS 90
-
B. Chor, M. Geréb-Graus, and E. Kushilevitz, Private computations over the integers, SIAM J. Comput. 24, No. 2 (1995), 376-386; FOCS 90.
-
(1995)
SIAM J. Comput.
, vol.24
, Issue.2
, pp. 376-386
-
-
Chor, B.1
Geréb-Graus, M.2
Kushilevitz, E.3
-
11
-
-
0027986369
-
A minimal model for secure computation
-
U. Feige, J. Kilian, and M. Naor, A minimal model for secure computation, in "Proc. of 26th STOC, 1994," pp. 554-563.
-
Proc. of 26th STOC, 1994
, pp. 554-563
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
12
-
-
0026985378
-
Communication complexity of secure computation
-
M. Franklin and M. Yung, Communication complexity of secure computation, "Proc. of 24th STOC, 1992," pp. 699-710.
-
Proc. of 24th STOC, 1992
, pp. 699-710
-
-
Franklin, M.1
Yung, M.2
-
13
-
-
0023545076
-
How to play any mental game
-
O. Goldreich, S. Micali, and A. Widgerson, How to play any mental game, in "Proc. of 19th STOC, 1987," pp. 218-229.
-
Proc. of 19th STOC, 1987
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Widgerson, A.3
-
15
-
-
84968329589
-
Reducibility and completeness in multi-party private computations
-
E. Kushilevitz, S. Micali, and R. Ostrovsky, Reducibility and completeness in multi-party private computations, in "Proc. of 35th FOCS, 1994," pp. 478-489.
-
Proc. of 35th FOCS, 1994
, pp. 478-489
-
-
Kushilevitz, E.1
Micali, S.2
Ostrovsky, R.3
-
16
-
-
0002365530
-
Privacy and communication complexity
-
FOCS 89
-
E. Kushilevitz, Privacy and communication complexity, SIAM J. Disc. Math. 5, No. 2 (1992), 273-284; FOCS 89.
-
(1992)
SIAM J. Disc. Math.
, vol.5
, Issue.2
, pp. 273-284
-
-
Kushilevitz, E.1
-
17
-
-
85030064106
-
A randomness-rounds tradeoff in private computation
-
to appear; Crypto 94
-
E. Kushilevitz and A. Rosén, A randomness-rounds tradeoff in private computation, SIAM J. Disc. Math., to appear; Crypto 94.
-
SIAM J. Disc. Math.
-
-
Kushilevitz, E.1
Rosén, A.2
-
18
-
-
0040666550
-
A 2.5n lower bound on the combinatorial complexity of Boolean functions
-
W. J. Paul, A 2.5n lower bound on the combinatorial complexity of Boolean functions, SIAM Comput. 5, No. 3 (1977), 427-443.
-
(1977)
SIAM Comput.
, vol.5
, Issue.3
, pp. 427-443
-
-
Paul, W.J.1
-
19
-
-
84856043672
-
A mathematical theory of communication
-
C. E. Shannon, A mathematical theory of communication, Bell System Tech. Jour. 27 (1948), 379-423, 623-656.
-
(1948)
Bell System Tech. Jour.
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
20
-
-
0022882770
-
How to generate and exchange secrets
-
A. C. Yao, How to generate and exchange secrets, in "Proc. of 27th FOCS, 1986," pp. 162-167.
-
Proc. of 27th FOCS, 1986
, pp. 162-167
-
-
Yao, A.C.1
-
21
-
-
0026170638
-
A 4n lowerbound on the combinational complexity of certain symmetric Boolean functions over the basis of unate dyadic Boolean functions
-
U. Zwick, A 4n lowerbound on the combinational complexity of certain symmetric Boolean functions over the basis of unate dyadic Boolean functions, SIAM J. Comput. 20 (1991).
-
(1991)
SIAM J. Comput.
, vol.20
-
-
Zwick, U.1
|