-
1
-
-
85177141026
-
The complexity of matrix rank and feasible systems of linear equations
-
E. Allender R. Beals M. Ogihara The complexity of matrix rank and feasible systems of linear equations Proc. of 28nd STOC 503 513 Proc. of 28nd STOC 1996
-
(1996)
, pp. 503-513
-
-
Allender, E.1
Beals, R.2
Ogihara, M.3
-
2
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds
-
J. Bar-Ilan D. Beaver Non-cryptographic fault-tolerant computing in a constant number of rounds Proc. of 8th PODC 201 209 Proc. of 8th PODC 1989
-
(1989)
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
3
-
-
0026991171
-
Representing Boolean functions as polynomials modulo composite numbers
-
D. Barrington R. Beigel S. Rudich Representing Boolean functions as polynomials modulo composite numbers Proc. of 24th STOC 455 461 Proc. of 24th STOC 1992
-
(1992)
, pp. 455-461
-
-
Barrington, D.1
Beigel, R.2
Rudich, S.3
-
4
-
-
84948952992
-
Minimal-latency secure function evaluation
-
D. Beaver Minimal-latency secure function evaluation Proc. EUROCRYPT 2000 335 350 Proc. EUROCRYPT 2000
-
-
-
Beaver, D.1
-
6
-
-
0025137207
-
The round complexity of secure protocols (extended abstract)
-
D. Beaver S. Micali P. Rogaway The round complexity of secure protocols (extended abstract) Proc. of 22nd STOC 503 513 Proc. of 22nd STOC 1990
-
(1990)
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
7
-
-
0027204515
-
The polynomial method in circuit complexity
-
R. Beigel The polynomial method in circuit complexity Proc. of structure in complexity theory 82 95 Proc. of structure in complexity theory 1993
-
(1993)
, pp. 82-95
-
-
Beigel, R.1
-
8
-
-
85031632064
-
On arithmetic branching programs
-
A. Beimel A. Gal On arithmetic branching programs Proc. of the 13th Annu. IEEE Conf. on Computational Complexity 68 80 Proc. of the 13th Annu. IEEE Conf. on Computational Complexity 1998
-
(1998)
, pp. 68-80
-
-
Beimel, A.1
Gal, A.2
-
9
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or S. Goldwasser A. Wigderson Completeness theorems for non-cryptographic fault-tolerant distributed computation Proc. of 20th STOC 1 10 Proc. of 20th STOC 1988
-
(1988)
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
10
-
-
84904333112
-
One-round secure computation and secure autonomous mobile agents
-
C. Cachin J. Camenisch J. Kilian J. Muller One-round secure computation and secure autonomous mobile agents ICALP 2000 ICALP 2000
-
-
-
Cachin, C.1
Camenisch, J.2
Kilian, J.3
Muller, J.4
-
11
-
-
0000731055
-
Security and composition of multi-party cryptographic protocols
-
R. Canetti Security and composition of multi-party cryptographic protocols J. Cryptology 13 1 143 202 2000
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
12
-
-
84898947315
-
Multiparty unconditionally secure protocols (extended abstract)
-
D. Chaum C. Crépeau I. Damgård Multiparty unconditionally secure protocols (extended abstract) Proc. of 20th STOC 11 19 Proc. of 20th STOC 1988
-
(1988)
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
13
-
-
0022198802
-
The bit extraction problem of t-resilient functions (preliminary version)
-
B. Chor O. Goldreich J. Hastad J. Friedman S. Rudich R. Smolensky The bit extraction problem of t-resilient functions (preliminary version) Proc. of 26th FOCS 396 407 Proc. of 26th FOCS 1985
-
(1985)
, pp. 396-407
-
-
Chor, B.1
Goldreich, O.2
Hastad, J.3
Friedman, J.4
Rudich, S.5
Smolensky, R.6
-
14
-
-
85177132065
-
-
-
-
-
15
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
R. Cramer I. Damgård S. Dziembowski M. Hirt T. Rabin Efficient multiparty computations secure against an adaptive adversary Proc. EUROCRYPT '99 311 326 Proc. EUROCRYPT '99
-
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
16
-
-
84948975649
-
General secure multiparty computation from any linear secret-sharing scheme
-
R. Cramer I. Damgård U. Maurer General secure multiparty computation from any linear secret-sharing scheme Proc. of EUROCRYPT 2000 316 334 Proc. of EUROCRYPT 2000
-
-
-
Cramer, R.1
Damgård, I.2
Maurer, U.3
-
17
-
-
0027986369
-
A minimal model for secure computation (extended abstract)
-
U. Feige J. Kilian M. Naor A minimal model for secure computation (extended abstract) Proc. of 26th STOC 554 563 Proc. of 26th STOC 1994
-
(1994)
, pp. 554-563
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
18
-
-
0031628398
-
Fact-track multiparty computations with applications to threshold cryptography
-
R. Gennaro M. O. Rabin T. Rabin Fact-track multiparty computations with applications to threshold cryptography Proc. of 17th PODC 101 111 Proc. of 17th PODC 1998
-
(1998)
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
-
19
-
-
85177105240
-
Probabilstic Methods and Pseudo-Randomness
-
Modern Cryptography Springer-Verlag
-
O. Goldreich Probabilstic Methods and Pseudo-Randomness 1999 Springer-Verlag Modern Cryptography
-
(1999)
-
-
Goldreich, O.1
-
20
-
-
85177110279
-
-
-
-
-
21
-
-
0002337124
-
How to play any mental game (extended abstract)
-
O. Goldreich S. Micali A. Wigderson How to play any mental game (extended abstract) Proc. of 19th STOC 218 229 Proc. of 19th STOC 1987
-
(1987)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
0030718794
-
Private simultaneous messages protocols with applications
-
Y. Ishai E. Kushilevitz Private simultaneous messages protocols with applications Proc. of 5th ISTCS 174 183 Proc. of 5th ISTCS 1997
-
(1997)
, pp. 174-183
-
-
Ishai, Y.1
Kushilevitz, E.2
-
23
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
J. Kilian Founding cryptography on oblivious transfer Proc. of 20th STOC 20 31 Proc. of 20th STOC 1988
-
(1988)
, pp. 20-31
-
-
Kilian, J.1
-
24
-
-
0003013846
-
New directions in testing
-
R. Lipton New directions in testing Proc. of DIMACS workshop on distributed computing and cryptography Proc. of DIMACS workshop on distributed computing and cryptography 1989
-
(1989)
-
-
Lipton, R.1
-
25
-
-
0002187139
-
Secure computation
-
S. Micali P. Rogaway Secure computation Proc. of CRYPTO '91 392 404 Proc. of CRYPTO '91
-
-
-
Micali, S.1
Rogaway, P.2
-
26
-
-
0000607672
-
On the degree of Boolean functions as real polynomials
-
N. Nisan M. Szegedy On the degree of Boolean functions as real polynomials Computational Complexity 4 301 313 1994
-
(1994)
Computational Complexity
, vol.4
, pp. 301-313
-
-
Nisan, N.1
Szegedy, M.2
-
27
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
T. Rabin M. Ben-Or Verifiable secret sharing and multiparty protocols with honest majority Proc. of 21st STOC 73 85 Proc. of 21st STOC 1989
-
(1989)
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
28
-
-
26944478724
-
Lower bounds for the size of circuits of bounded depth with basis {\\^,♁}
-
A. A. Razborov Lower bounds for the size of circuits of bounded depth with basis {\\^,♁} Math. notes of the Academy of Science of the USSR 41 4 333 338 1987
-
(1987)
Math. notes of the Academy of Science of the USSR
, vol.41
, Issue.4
, pp. 333-338
-
-
Razborov, A.A.1
-
29
-
-
0033309271
-
Non-interactive cryptocomputing for NC1
-
T. Sandler A. Young M. Yung Non-interactive cryptocomputing for NC1 Proc. of 40th FOCS 554 566 Proc. of 40th FOCS 1999
-
(1999)
, pp. 554-566
-
-
Sandler, T.1
Young, A.2
Yung, M.3
-
30
-
-
0018545449
-
How to share a secret
-
A. Shamir How to share a secret Commun. ACM 22 6 612 613 June 1979
-
(1979)
Commun. ACM
, vol.22
, Issue.6
, pp. 612-613
-
-
Shamir, A.1
-
31
-
-
0023570259
-
Algebraic methods in the theory of lower bounds for Boolean circuit complexity
-
R. Smolensky Algebraic methods in the theory of lower bounds for Boolean circuit complexity Proc. of 19th STOC 77 82 Proc. of 19th STOC 1987
-
(1987)
, pp. 77-82
-
-
Smolensky, R.1
-
32
-
-
84936047855
-
Randomized polynomials, threshold circuits, and the polynomial hierarchy
-
J. Tarui Randomized polynomials, threshold circuits, and the polynomial hierarchy Proc. of 8th Symp. on Theoretical Aspects of Computer Science 238 250 Proc. of 8th Symp. on Theoretical Aspects of Computer Science 1991
-
(1991)
, pp. 238-250
-
-
Tarui, J.1
-
33
-
-
0027309991
-
Lower bounds on representing Boolean functions as polynomials in Zm
-
S. Tsai Lower bounds on representing Boolean functions as polynomials in Zm Proceedings of the 8th Annual Structure in Complexity Theory 96 101 Proceedings of the 8th Annual Structure in Complexity Theory 1993
-
(1993)
, pp. 96-101
-
-
Tsai, S.1
-
34
-
-
0028554636
-
NL/poly ⊆ ♁L/poly
-
A. Wigderson NL/poly ⊆ ♁L/poly Proc. of the 9th Annual Structure in Complexity Theory 59 62 Proc. of the 9th Annual Structure in Complexity Theory 1994
-
(1994)
, pp. 59-62
-
-
Wigderson, A.1
-
35
-
-
0020312165
-
Protocols for secure computations (extended abstract)
-
A. C. Yao Protocols for secure computations (extended abstract) Proc. of 23rd FOCS 160 164 Proc. of 23rd FOCS 1982
-
(1982)
, pp. 160-164
-
-
Yao, A.C.1
-
36
-
-
0022882770
-
How to generate and exchange secrets
-
A. C. Yao How to generate and exchange secrets Proc. of 27th FOCS 162 167 Proc. of 27th FOCS 1986
-
(1986)
, pp. 162-167
-
-
Yao, A.C.1
|