-
1
-
-
84958639277
-
Efficient generation of shared RSA keys
-
Springer-Verlag
-
D. Boneh and M. Franklin, "Efficient generation of shared RSA keys," Advances in Cryptology -CRYPTO'97, Springer-Verlag, pp.425-439, 1997.
-
(1997)
Advances in Cryptology -CRYPTO'97
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
2
-
-
84979502594
-
Security with Low communication overhead
-
D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway, "Security with Low communication overhead," Crytpo '90, pp.62-76, 1990.
-
(1990)
Crytpo '90
, pp. 62-76
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
3
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," STOC88, pp.1-10, 1998.
-
(1998)
STOC88
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
0025137207
-
The round complexity of secure protocols
-
D. Beaver, S. Michali, and P. Rogaway, "The round complexity of secure protocols," STOC, pp.503-513, 1990.
-
(1990)
STOC
, pp. 503-513
-
-
Beaver, D.1
Michali, S.2
Rogaway, P.3
-
5
-
-
0024769014
-
Multiparty computation with faulty majority
-
D. Beaver and S. Goldwasser, "Multiparty computation with faulty majority," Proc. of FOCS, pp.468-473, 1989.
-
(1989)
Proc. of FOCS
, pp. 468-473
-
-
Beaver, D.1
Goldwasser, S.2
-
6
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crepeau, and I. Damgard, "Multiparty unconditionally secure protocols," STOC88, pp. 11-19, 1988.
-
(1988)
STOC88
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
7
-
-
84864708144
-
Multiparty computations ensuring privacy of each Party's input and correctness of the result
-
LNCS 298
-
D. Chaum, I. Damgard, and J. van de Graaf, "Multiparty computations ensuring privacy of each Party's input and correctness of the result," CRYPTO '87, LNCS 298, pp.87-119, 1987.
-
(1987)
CRYPTO '87
, pp. 87-119
-
-
Chaum, D.1
Damgard, I.2
Van De Graaf, J.3
-
8
-
-
0001635563
-
Internet cost allocation and pricing
-
MIT Press
-
D. Clark, "Internet cost allocation and pricing," Internet Economics, MIT Press, 1997.
-
(1997)
Internet Economics
-
-
Clark, D.1
-
9
-
-
0023861309
-
The dining cryptographer problem: Unconditional sender and receiver untraceability
-
D. Chaum, "The dining cryptographer problem: Unconditional sender and receiver untraceability," Journal of Cryptology, vol.1, no.1, pp.65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
10
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts," CACM, vol.28, no.6, pp.637-647, 1985.
-
(1985)
CACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
11
-
-
0001710760
-
The design and implementation of a secure auction service
-
M.K. Franklin and M.K. Reiter, "The design and implementation of a secure auction service," IEEE Trans. Software Engineering, vol.22, no.5, pp.302-312, 1996.
-
(1996)
IEEE Trans. Software Engineering
, vol.22
, Issue.5
, pp. 302-312
-
-
Franklin, M.K.1
Reiter, M.K.2
-
12
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
LNCS 263
-
A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems," Proc. Crypto'86, LNCS 263, pp.186-194, 1986.
-
(1986)
Proc. Crypto'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
13
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game or a completeness theorem for protocols with honest majority," ACM STOC, pp.218-229, 1987.
-
(1987)
ACM STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
15
-
-
0002566132
-
Auctions and bidding: A primer
-
P. Milgrom, "Auctions and bidding: A primer," Journal of Economic Perspectives, vol.3, no.3, pp.3-22, 1989.
-
(1989)
Journal of Economic Perspectives
, vol.3
, Issue.3
, pp. 3-22
-
-
Milgrom, P.1
-
17
-
-
0004235785
-
-
Oxford university press
-
A. Mas-Colell, M.D. Whinston, and J.R. Green, "Microeconomic Theory," Oxford university press, pp.857-925, 1995.
-
(1995)
Microeconomic Theory
, pp. 857-925
-
-
Mas-Colell, A.1
Whinston, M.D.2
Green, J.R.3
-
18
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
T. Rabin and M. Ben-Or, "Verifiable secret sharing and multiparty protocols with honest majority," STOC '89, pp.73-85, 1989.
-
(1989)
STOC '89
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
19
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," CACM, vol.22, pp.612-613, 1979.
-
(1979)
CACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|