-
1
-
-
79251578513
-
On the (im)possibility of software obfuscation
-
Crypto 2001
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of software obfuscation. In Crypto 2001, pages 1-18, 2001. LNCS 2139.
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
2
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
D. Boneh, E. Goh, K. Nissim. Evaluating 2-DNF Formulas on Ciphertexts. TCC 2005: 325-341
-
TCC 2005
, pp. 325-341
-
-
Boneh, D.1
Goh, E.2
Nissim, K.3
-
4
-
-
33745139347
-
Single database private information retrieval with logarithmic communication
-
Y. C. Chang. Single Database Private Information Retrieval with Logarithmic Communication. ACISP 2004
-
ACISP 2004
-
-
Chang, Y.C.1
-
5
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, Springer
-
C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 402-414. Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
6
-
-
0003701129
-
-
Department of Computer Science, Technion
-
B. Chor, N. Gilboa, M. Naor Private Information Retrieval by Keywords in Technical Report TR CS0917, Department of Computer Science, Technion, 1998.
-
(1998)
Private Information Retrieval by Keywords in Technical Report
, vol.TR CS0917
-
-
Chor, B.1
Gilboa, N.2
Naor, M.3
-
7
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proc. of the 36th Annu. IEEE Symp. on Foundations of Computer Science, pages 41-51, 1995.
-
(1995)
Proc. of the 36th Annu. IEEE Symp. on Foundations of Computer Science
, pp. 41-51
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
8
-
-
0032201622
-
-
Journal version
-
Journal version: J. of the ACM, 45:965-981, 1998.
-
(1998)
J. of the ACM
, vol.45
, pp. 965-981
-
-
-
10
-
-
0002908662
-
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
-
I. Damgård, M. Jurik. A Generalisation, a Simplification and some Applications of Paillier's Probabilistic Public-Key System. In Public Key Cryptography (PKC 2001)
-
Public Key Cryptography (PKC 2001)
-
-
Damgård, I.1
Jurik, M.2
-
11
-
-
33745161240
-
Keyword search and oblivious pseudorandom functions
-
To appear Cambridge, MA, Feb
-
M. Freedman, Y. Ishai, B. Pinkas and O. Reingold. Keyword Search and Oblivious Pseudorandom Functions. To appear in 2nd Theory of Cryptography Conference (TCC '05) Cambridge, MA, Feb 2005.
-
(2005)
2nd Theory of Cryptography Conference (TCC '05)
-
-
Freedman, M.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
12
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali. Probabilistic encryption. In J. Comp. Sys. Sci, 28(1):270-299, 1984.
-
(1984)
J. Comp. Sys. Sci
, vol.28
, Issue.1
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
13
-
-
1942420748
-
Oblivious keyword search
-
April/June Special issue on coding and cryptography
-
K. Kurosawa, W. Ogata. Oblivious Keyword Search. Journal of Complexity, Volume 20, Issue 2-3 April/June 2004 Special issue on coding and cryptography Pages: 356-371
-
(2004)
Journal of Complexity
, vol.20
, Issue.2-3
, pp. 356-371
-
-
Kurosawa, K.1
Ogata, W.2
-
15
-
-
23044519068
-
One-way trapdoor permutations are sufficient for non-trivial single-database computationally-private information retrieval
-
E. Kushilevitz and R. Ostrovsky. One-way Trapdoor Permutations are Sufficient for Non-Trivial Single-Database Computationally-Private Information Retrieval. In Proc. of EUROCRYPT '00, 2000.
-
(2000)
Proc. of EUROCRYPT '00
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
18
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation. Proc. 31st STOC, pp. 245-254, 1999.
-
(1999)
Proc. 31st STOC
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
19
-
-
84942550998
-
Public key cryptosystems based on composite degree residue classes
-
Advances in Cryptology - EUROCRYPT '99, Springer Verlag
-
P. Paillier. Public Key Cryptosystems based on Composite Degree Residue Classes. Advances in Cryptology - EUROCRYPT '99, LNCS volume 1592, pp. 223-238. Springer Verlag, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
|