-
2
-
-
0003327509
-
-
[Bec54]. New York: Grove Press
-
[Bec54] Samuel Beckett. Waiting for Godot. New York: Grove Press, 1954.
-
(1954)
Waiting for Godot
-
-
Beckett, S.1
-
3
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
[BGW88]
-
[BGW88] Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. 20th ACM STOC, pages 1-10, 1988.
-
(1988)
Proc. 20th ACM STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
85008184918
-
Asynchronous secure computations with optimal resilience
-
[BKR94]
-
[BKR94] Michael Ben-Or, Boaz Kelmer, and Tal Rabin. Asynchronous secure computations with optimal resilience. In Proc. 13th ACM PODC, pages 183-192, 1994.
-
(1994)
Proc. 13th ACM PODC
, pp. 183-192
-
-
Ben-Or, M.1
Kelmer, B.2
Rabin, T.3
-
6
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
[Can01]
-
[Can01] Ran Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd IEEE FOCS, pages 136-145, 2001.
-
(2001)
Proc. 42nd IEEE FOCS
, pp. 136-145
-
-
Canetti, R.1
-
7
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
[CCD88]
-
[CCD88] David Chaum, Claude Crépeau, and Ivan Damgård. Multiparty unconditionally secure protocols (extended abstract). In Proc. 20th ACM STOC, pages 11-19, 1988.
-
(1988)
Proc. 20th ACM STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
8
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
[CDN01]
-
[CDN01] Ronald Cramer, Ivan Damgård, and Jesper B. Nielsen. Multiparty computation from threshold homomorphic encryption. In Proc. EUROCRYPT '01, pages 280-300, 2001.
-
(2001)
Proc. EUROCRYPT '01
, pp. 280-300
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
9
-
-
0034500567
-
Random oracles in Constantinopole: Practical asynchronous Byzantine agreement using cryptography
-
[CKS00]
-
[CKS00] Christian Cachin, Klaus Kursawe, and Victor Shoup. Random oracles in Constantinopole: Practical asynchronous Byzantine agreement using cryptography. In Proc. 19th ACM PODC, pages 123-132, 2000.
-
(2000)
Proc. 19th ACM PODC
, pp. 123-132
-
-
Cachin, C.1
Kursawe, K.2
Shoup, V.3
-
10
-
-
0002908662
-
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
-
[DJ01]
-
[DJ01] Ivan Damgård and Mads Jurik. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In Proc. 4th PKC, pages 110-136, 2001.
-
(2001)
Proc. 4th PKC
, pp. 110-136
-
-
Damgård, I.1
Jurik, M.2
-
11
-
-
0002992068
-
Joint encryption and message-efficient secure computation
-
[FH96]
-
[FH96] Matt Franklin and Stuart Haber. Joint encryption and message-efficient secure computation. Journal of Cryptology, 9(4):217-232, 1996.
-
(1996)
Journal of Cryptology
, vol.9
, Issue.4
, pp. 217-232
-
-
Franklin, M.1
Haber, S.2
-
13
-
-
84947284060
-
Secure computation without agreement
-
[GL02]
-
[GL02] S. Goldwasser and Y. Lindell. Secure computation without agreement. In DISC '02, pages 17-32, 2002.
-
(2002)
DISC '02
, pp. 17-32
-
-
Goldwasser, S.1
Lindell, Y.2
-
14
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
[GMW87]
-
[GMW87] Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game - a completeness theorem for protocols with honest majority. In Proc. 19th ACM STOC, pages 218-229, 1987.
-
(1987)
Proc. 19th ACM STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
15
-
-
24944564422
-
Cryptographic asynchronous multi-party computation with optimal resilience, 2004
-
[HNP04], eprint.iacr.org, report no. 2004/368
-
[HNP04] Martin Hirt, Jesper Buus Nielsen, and Bartosz Przydatek. Cryptographic asynchronous multi-party computation with optimal resilience, 2004. Cryptology ePrint Archive, eprint.iacr.org, report no. 2004/368.
-
Cryptology ePrint Archive
-
-
Hirt, M.1
Nielsen, J.B.2
Przydatek, B.3
-
16
-
-
84937429269
-
A threshold pseudorandom function construction and its applications
-
[Nie02]
-
[Nie02] Jesper B. Nielsen. A threshold pseudorandom function construction and its applications. In Proc. CRYPTO '02, pages 401-416, 2002.
-
(2002)
Proc. CRYPTO '02
, pp. 401-416
-
-
Nielsen, J.B.1
-
17
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
[Pai99]
-
[Pai99] Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proc. EUROCRYPT '99, pages 223-238, 1999.
-
(1999)
Proc. EUROCRYPT '99
, pp. 223-238
-
-
Paillier, P.1
-
18
-
-
84974727234
-
Asynchronous unconditionally secure computation: An efficiency improvement
-
[PSR02]
-
[PSR02] B. Prabhu, K. Srinathan, and C. Pandu Rangan. Asynchronous unconditionally secure computation: An efficiency improvement. In Proc. Indocrypt 2002, pages 93-107, 2002.
-
(2002)
Proc. Indocrypt 2002
, pp. 93-107
-
-
Prabhu, B.1
Srinathan, K.2
Rangan, C.P.3
-
19
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
[RSA78]
-
[RSA78] Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
20
-
-
84948954277
-
Practical threshold signatures
-
[Sho00]
-
[Sho00] Victor Shoup. Practical threshold signatures. In Proc. EUROCRYPT '00, pages 207-220, 2000.
-
(2000)
Proc. EUROCRYPT '00
, pp. 207-220
-
-
Shoup, V.1
-
21
-
-
84947784853
-
Efficient asynchronous secure multiparty distributed computation
-
[SR00]
-
[SR00] K. Srinathan and C. Pandu Rangan. Efficient asynchronous secure multiparty distributed computation. In Proc. Indocrypt 2000, pages 117-129, 2000.
-
(2000)
Proc. Indocrypt 2000
, pp. 117-129
-
-
Srinathan, K.1
Rangan, C.P.2
-
22
-
-
35048828873
-
Practical two-party computation based on the conditional gate
-
[ST04]
-
[ST04] Berry Schoenmakers and Pim Tuyls. Practical two-party computation based on the conditional gate. In Proc. ASIACRYPT '04, pages 119-136, 2004.
-
(2004)
Proc. ASIACRYPT '04
, pp. 119-136
-
-
Schoenmakers, B.1
Tuyls, P.2
-
23
-
-
0020312165
-
Protocols for secure computations
-
[Yao82]
-
[Yao82] Andrew C. Yao. Protocols for secure computations. In Proc. 23rd IEEE FOCS, pages 160-164, 1982.
-
(1982)
Proc. 23rd IEEE FOCS
, pp. 160-164
-
-
Yao, A.C.1
|