-
1
-
-
0003839182
-
Secure multi-party computation, manuscript version 1.3
-
Goldreich O. Secure multi-party computation, manuscript version 1.3. 2002. http://theory.lcs.mit.edu/-oded
-
(2002)
-
-
Goldreich, O.1
-
4
-
-
0033280866
-
Efficient private bidding and auctions with an oblivious third party
-
ACM Conf. on Computer and Communications Security, (ed.), Assn for Computing Machinery
-
Cachin C. Efficient private bidding and auctions with an oblivious third party. In: ACM Conf. on Computer and Communications Security, ed. Proc. of the 6th ACM Conf. on Computer and Communications Security. Assn for Computing Machinery, 1999. 120-127.
-
(1999)
Proc. of the 6th ACM Conf. on Computer and Communications Security
, pp. 120-127
-
-
Cachin, C.1
-
5
-
-
0030150177
-
Comparing information without leaking it
-
Fagin R, Naor M, Winkler P. Comparing information without leaking it. Communications of the ACM, 1996, 39(5): 77-85.
-
(1996)
Communications of the ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
6
-
-
0003851399
-
Applied cryptography: Protocols, algorithms, and source code in C
-
2nd ed., John Wiley and Sons, Inc.
-
Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed., John Wiley and Sons, Inc., 1996.
-
(1996)
-
-
Schneier, B.1
-
7
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
Slern J. (ed.), Lecture Notes in Computer Science, Springer-Verlag
-
Cachin C, Micali S, Stadler M. Computationally private information retrieval with polylogarithmic communication. In: Slern J, ed. Proc. of the Advances in Cryptology-Eurocrypt'99. Lecture Notes in Computer Science, Vol.1592, Springer-Verlag, 1999. 402-414.
-
(1999)
Proc. of the Advances in Cryptology-Eurocrypt'99
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
8
-
-
0032218237
-
A new public-key cryptosystem based on higher residues
-
Association for Computing Machinery, (ed.), San Francisco: ACM
-
Naccache D, Stern J. A new public-key cryptosystem based on higher residues. In: Association for Computing Machinery, ed. Proc. of the 5th ACM Conf. on Computer and Communications Security. San Francisco: ACM, 1998. 59-66.
-
(1998)
Proc. of the 5th ACM Conf. on Computer and Communications Security
, pp. 59-66
-
-
Naccache, D.1
Stern, J.2
-
9
-
-
84956852274
-
A new public key cryptosystem as secure as factoring
-
Nyberg K. (ed.), Lecture Notes in Computer Science, Springer-Verlag
-
Okamoto T, Uchiyama S. A new public key cryptosystem as secure as factoring. In: Nyberg K, ed. Proc. of the Advances in Cryptology-Eurocrypt'98. Lecture Notes in Computer Science, Vol 1403, Springer-Verlag, 1998. 308-318.
-
(1998)
Proc. of the Advances in Cryptology-Eurocrypt'98
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
10
-
-
84942550998
-
Public-Key cryptosystem based on composite degree residuosity classes
-
Lecture Notes in Computer Science, Springer-Verlag
-
Paillier P. Public-Key cryptosystem based on composite degree residuosity classes. In: Proc. of the Advances in Cryptology-Euroctypt'99. Lecture Notes in Computer Science, Vol 1592, Springer-Verlag, 1999. 223-238.
-
(1999)
Proc. of the Advances in Cryptology-Euroctypt'99
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
11
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
Association for Computing Machinery, (ed.), Seattle: ACM
-
Naor M, Yung M. Universal one-way hash functions and their cryptographic applications. In: Association for Computing Machinery, ed. Proc. of the 21st Annual ACM Symp. on Theory of Computing (STOC). Seattle: ACM, 1989. 33-43.
-
(1989)
Proc. of the 21st Annual ACM Symp. on Theory of Computing (STOC)
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
12
-
-
2942747407
-
A note on negligible functions
-
Bellare M. A note on negligible functions. Journal of Cryptology, 2002, 15(4): 271-284.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.4
, pp. 271-284
-
-
Bellare, M.1
|