-
1
-
-
24144433396
-
Evaluating 2-DNF Formulas on Ciphertexts
-
D. Boneh, E. Goh, and K. Nissim. Evaluating 2-DNF Formulas on Ciphertexts. TCC 2005 pages 325-341.
-
TCC 2005
, pp. 325-341
-
-
Boneh, D.1
Goh, E.2
Nissim, K.3
-
2
-
-
0034672929
-
Uniform generation of NP-witnesses using an NP-oracle
-
M. Bellare, O. Goldreich, and E. Petrank. Uniform Generation of NP-Witnesses Using an NP-Oracle. In Inf. Comput. 163(2): 510-526 (2000).
-
(2000)
Inf. Comput.
, vol.163
, Issue.2
, pp. 510-526
-
-
Bellare, M.1
Goldreich, O.2
Petrank, E.3
-
3
-
-
84943422766
-
Separating the power of monotone span programs over different fields
-
A. Beimel, and E. Weinreb. Separating the Power of Monotone Span Programs over Different Fields. In FOCS 2003: 428-437.
-
FOCS 2003
, pp. 428-437
-
-
Beimel, A.1
Weinreb, E.2
-
4
-
-
0020097420
-
Fast parallel matrix and gcd computations
-
March
-
A. Borodin, J. von zur Gathen, and J. Hopcroft. Fast parallel matrix and gcd computations. In Information and Control, 52(3):241-256, March 1982.
-
(1982)
Information and Control
, vol.52
, Issue.3
, pp. 241-256
-
-
Borodin, A.1
Von Zur Gathen, J.2
Hopcroft, J.3
-
5
-
-
84880872502
-
Secure distributed linear algebra in a constant number of rounds
-
R. Cramer, and I. Damgård. Secure Distributed Linear Algebra in a Constant Number of Rounds. In CRYPTO 2001: 119-136.
-
CRYPTO 2001
, pp. 119-136
-
-
Cramer, R.1
Damgård, I.2
-
7
-
-
84867553981
-
A generalization, a simplification and some applications of Paillier's probabilistic public-key system
-
K. Kim, editor, Proceedings of Public Key Cryptography 2001, Springer
-
I. Damgård and M. Jurik. A generalization, a simplification and some applications of Paillier's probabilistic public-key system. In K. Kim, editor, Proceedings of Public Key Cryptography 2001, volume 1992 of LNCS, pages 119-136. Springer, 2001.
-
(2001)
LNCS
, vol.1992
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
8
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Jul
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469-472, Jul 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
12
-
-
33746437508
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas. Privacy Preserving Data Mining In J. Cryptology 15(3): 177-206, 2002.
-
(2002)
J. Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
13
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
J. Stern, editor, Proceedings of Eurocrypt 1999, Springer-Verlag, May
-
P. Pallier. Public-key cryptosystems based on composite degree residuosity classes. In J. Stern, editor, Proceedings of Eurocrypt 1999, volume 1592 of LNCS, pages 223-238. Springer-Verlag, May 1999.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Pallier, P.1
-
14
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
D. Davies, editor, Proceedings of Eurocrypt 1991, Springer
-
T. P. Pedersen. A threshold cryptosystem without a trusted party. In D. Davies, editor, Proceedings of Eurocrypt 1991, volume 547 of LNCS, pages 522-526. Springer, 1991.
-
(1991)
LNCS
, vol.547
, pp. 522-526
-
-
Pedersen, T.P.1
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptoSystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman. A Method for Obtaining Digital Signatures and Public-Key CryptoSystems. Commun. ACM 21(2): 120-126 (1978).
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
16
-
-
0033309271
-
1
-
New York, NY, USA, Oct.
-
1. In Proceedings of the 40th Symposium on Foundations of Computer Science (FOCS), pages 554-567, New York, NY, USA, Oct. 1999. IEEE Computer Society Press.
-
(1999)
Proceedings of the 40th Symposium on Foundations of Computer Science (FOCS)
, pp. 554-567
-
-
Sander, T.1
Young, A.2
Yung, M.3
|