-
2
-
-
0344794028
-
Tracking join and self-join sizes in limited storage
-
ALON, N., GIBBONS, P. B., MATIAS, Y., AND SZEGEDY, M. 2002. Tracking join and self-join sizes in limited storage. J. Comput. Syst. Science 64, 3, 719-747.
-
(2002)
J. Comput. Syst. Science
, vol.64
, Issue.3
, pp. 719-747
-
-
Alon, N.1
Gibbons, P.B.2
Matias, Y.3
Szegedy, M.4
-
3
-
-
0033077324
-
The space complexity of approximating the frequency moments
-
ALON, N., MATIAS, Y., AND SZEGEDY, M. 1999. The space complexity of approximating the frequency moments. J. Comput. Syst. Science 58, 1, 137-147.
-
(1999)
J. Comput. Syst. Science
, vol.58
, Issue.1
, pp. 137-147
-
-
Alon, N.1
Matias, Y.2
Szegedy, M.3
-
4
-
-
0003430191
-
-
John Wiley. BAR-YOSSEF, Z. 2004. Personal Communication
-
ALON, N. AND SPENCER, J. 1992. The Probabilistic Method. John Wiley. BAR-YOSSEF, Z. 2004. Personal Communication.
-
(1992)
The Probabilistic Method
-
-
Alon, N.1
Spencer, J.2
-
5
-
-
85029542707
-
Foundations of secure interactive computing
-
Lecture Notes in Computer Science. Springer-Verlag
-
BEAVER, D. 1991. Foundations of secure interactive computing. In Advances in Cryptology (CRYPTO'91) Lecture Notes in Computer Science, vol. 576. Springer-Verlag, 377-391.
-
(1991)
Advances in Cryptology (CRYPTO'91)
, vol.576
, pp. 377-391
-
-
Beaver, D.1
-
7
-
-
33748093542
-
Private approximation of search problems
-
BEIMEL, A., CARMI, P., NISSIM, K., AND WEINREB, E. 2006. Private approximation of search problems. In Proceedings of the 38th Annual ACM Symposium on the Theory of Computing. 119-128.
-
(2006)
Proceedings of the 38th Annual ACM Symposium on the Theory of Computing
, pp. 119-128
-
-
Beimel, A.1
Carmi, P.2
Nissim, K.3
Weinreb, E.4
-
8
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
ACM Press
-
BEN-OR, M., GOLDWASSER, S., AND WIGDERSON, A. 1988. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the 20th Annual ACM Symposium on the Theory of Computing. ACM Press, 1-10.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on the Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
9
-
-
33749019254
-
-
BRODER, A. 1986. How hard is it to marry at random? In Proceedings of the 18th Annual ACM Symposium on the Theory of Computing 50-58. (Erratum in 20th STOC, p. 551.)
-
BRODER, A. 1986. How hard is it to marry at random? In Proceedings of the 18th Annual ACM Symposium on the Theory of Computing. 50-58. (Erratum in 20th STOC, p. 551.)
-
-
-
-
10
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
Lecture Notes in Computer Science. Springer-Verlag
-
CACHIN, C., MICALI, S., AND STADLER, M. 1999. Computationally private information retrieval with polylogarithmic communication. In Advances in Cryptology (EUROCRYPT'99). Lecture Notes in Computer Science, vol. 1592. Springer-Verlag, 404-414.
-
(1999)
Advances in Cryptology (EUROCRYPT'99)
, vol.1592
, pp. 404-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
11
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
CANETTI, R. 2000. Security and composition of multiparty cryptographic protocols. J. Cryptology 13, 1, 143-202.
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
13
-
-
0034782679
-
Selective private function evaluation with applications to private statistics
-
ACM Press
-
CANETTI, R., ISHAI, Y., KUMAR, R., REITER, M., RUBINFELD, R., AND WRIGHT, R. 2001. Selective private function evaluation with applications to private statistics. In Proceedings of the 20th Annual ACM Symposium on Principles of Distributed Computing. ACM Press, 293-304.
-
(2001)
Proceedings of the 20th Annual ACM Symposium on Principles of Distributed Computing
, pp. 293-304
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.4
Rubinfeld, R.5
Wright, R.6
-
15
-
-
0032201622
-
Private information retrieval
-
CHOR, B., GOLDREICH, O., KUSHILEVTTZ, E., AND SUDAN, M. 1998. Private information retrieval. J. ACM 45, 965-981.
-
(1998)
J. ACM
, vol.45
, pp. 965-981
-
-
Chor, B.1
Goldreich, O.2
Kushilevttz, E.3
Sudan, M.4
-
16
-
-
0033896024
-
Communication complexity of document exchange
-
CORMODE, G., PATERSON, M., SAHINALP, S., AND VISHKIN, U. 2000. Communication complexity of document exchange. In the 11th Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms. 197-206.
-
(2000)
The 11th Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms
, pp. 197-206
-
-
Cormode, G.1
Paterson, M.2
Sahinalp, S.3
Vishkin, U.4
-
18
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Lecture Notes in Computer Science. Springer-Verlag
-
DODIS, Y., REYZIN, L., AND SMITH, A. 2004. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology (EUROCRYPT'04) Lecture Notes in Computer Science, vol. 3027. Springer-Verlag, 523-540.
-
(2004)
Advances in Cryptology (EUROCRYPT'04)
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
19
-
-
0022080529
-
A randomized protocol for signing contracts
-
EVEN, S., GOLDREICH, O., AND LEMPEL, A. 1985. A randomized protocol for signing contracts. Comm. ACM 28, 637-647.
-
(1985)
Comm. ACM
, vol.28
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
20
-
-
0001422160
-
Amortized communication complexity
-
FEDER, T., KUSHILEVITZ, E., NAOR, M., AND NISAN, N. 1995. Amortized communication complexity. SIAM J. Comput. 24, 4, 736-750.
-
(1995)
SIAM J. Comput.
, vol.24
, Issue.4
, pp. 736-750
-
-
Feder, T.1
Kushilevitz, E.2
Naor, M.3
Nisan, N.4
-
21
-
-
84879521412
-
Secure multiparty computation of approximations
-
Springer-Verlag
-
FEIGENBAUM, J., ISHAI, Y., MALKIN, T., NISSIM, K., STRAUSS, M., AND WRIGHT, R. N. 2001. Secure multiparty computation of approximations. In Proceedings of the 28th International Colloquium on Automata, Languages and Programming. Springer-Verlag, 927-938.
-
(2001)
Proceedings of the 28th International Colloquium on Automata, Languages and Programming
, pp. 927-938
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.3
Nissim, K.4
Strauss, M.5
Wright, R.N.6
-
22
-
-
0037943836
-
An approximate Lidifference algorithm for massive data streams
-
FEIGENBAUM, J., KANNAN, S., STRAUSS, M., AND VISWANATHAN, M. 2002. An approximate Lidifference algorithm for massive data streams. SIAM J. Comput. 32, 1, 131-151.
-
(2002)
SIAM J. Comput.
, vol.32
, Issue.1
, pp. 131-151
-
-
Feigenbaum, J.1
Kannan, S.2
Strauss, M.3
Viswanathan, M.4
-
23
-
-
35048820609
-
Efficient private matching and set intersection
-
Lecture Notes in Computer Science, Springer-Verlag
-
FREEDMAN, M., NISSIM, K., AND PINKAS, B. 2004. Efficient private matching and set intersection. In Advances in Cryptology (EUROCRYPT'04) Lecture Notes in Computer Science, vol. 3027. Springer-Verlag, 1-19.
-
(2004)
Advances in Cryptology (EUROCRYPT'04)
, vol.3027
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
26
-
-
0034205020
-
Protecting data privacy in private information retrieval schemes
-
GERTNER, Y., ISHAI, Y., KUSHILEVITZ, E., AND MALKIN, T. 2000. Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sciences 60, 3, 592-692.
-
(2000)
J. Comput. Syst. Sciences
, vol.60
, Issue.3
, pp. 592-692
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
28
-
-
0023545076
-
How to play any mental game
-
ACM Press
-
GOLDREICH, O., MICALI, S., AND WIGDERSON, A. 1987. How to play any mental game. In Proceedings of the 19th Annual ACM Symposium on the Theory of Computing. ACM Press, 218-229.
-
(1987)
Proceedings of the 19th Annual ACM Symposium on the Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
30
-
-
0034832945
-
Private approximations of NP-hard functions
-
HALEVI, S., KUSHILEVITZ, E., KRAUTHGAMER, R., AND NISSIM, K. 2001. Private approximations of NP-hard functions. In Proceedings of the 33th Annual ACM Symposium on the Theory of Computing. 550-559.
-
(2001)
Proceedings of the 33th Annual ACM Symposium on the Theory of Computing
, pp. 550-559
-
-
Halevi, S.1
Kushilevitz, E.2
Krauthgamer, R.3
Nissim, K.4
-
33
-
-
4544231738
-
Batch codes and their applications
-
ISHAI, Y., KUSHILEVITZ, E., OSTROVSKY, R., AND SAHAI, A. 2004. Batch codes and their applications. In Proceedings of the 36th Annual ACM Symposium on the Theory of Computing. 262-272.
-
(2004)
Proceedings of the 36th Annual ACM Symposium on the Theory of Computing
, pp. 262-272
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
34
-
-
0024904712
-
Approximating the permanent
-
JERRUM, M. AND SINCLAIR, A. 1989. Approximating the permanent. SIAM J. Comput. 18, 6, 1149-1178.
-
(1989)
SIAM J. Comput.
, vol.18
, Issue.6
, pp. 1149-1178
-
-
Jerrum, M.1
Sinclair, A.2
-
35
-
-
4243139497
-
A polynomial-time approximation algorithm for the permanent of a matrix with nonnegative entries
-
JERRUM, M., SINCLAIR, A., AND VIGODA, E. 2004. A polynomial-time approximation algorithm for the permanent of a matrix with nonnegative entries. J. ACM 51, 4, 671-697.
-
(2004)
J. ACM
, vol.51
, Issue.4
, pp. 671-697
-
-
Jerrum, M.1
Sinclair, A.2
Vigoda, E.3
-
36
-
-
38249043088
-
Random generation of combinatorial structures from a uniform distribution
-
JERRUM, M., VALIANT, L., AND VAZIRANI, V. 1986. Random generation of combinatorial structures from a uniform distribution. Theoret. Comput. Science 43, 169-188.
-
(1986)
Theoret. Comput. Science
, vol.43
, pp. 169-188
-
-
Jerrum, M.1
Valiant, L.2
Vazirani, V.3
-
38
-
-
33749018100
-
Round efficiency of multi-party computation with a dishonest majority
-
Lecture Notes in Computer Science. Springer-Verlag, 578-595.
-
KATZ, J., OSTROVSKY, R., AND SMITH, A. 2003. Round efficiency of multi-party computation with a dishonest majority. In Advances in Cryptology (EUROCRYPT'03) Lecture Notes in Computer Science, vol. 2656. Springer-Verlag, 578-595.
-
(2003)
Advances in Cryptology (EUROCRYPT'03)
, vol.2656
-
-
Katz, J.1
Ostrovsky, R.2
Smith, A.3
-
41
-
-
0037492265
-
Efficient search for approximate nearest neighbor in high dimensional spaces
-
KUSHILEVITZ, E., OSTROVSKY, R., AND RABANI, Y. 2000. Efficient search for approximate nearest neighbor in high dimensional spaces. SIAM J. Comput. 30, 2, 457-474.
-
(2000)
SIAM J. Comput.
, vol.30
, Issue.2
, pp. 457-474
-
-
Kushilevitz, E.1
Ostrovsky, R.2
Rabani, Y.3
-
42
-
-
4544235438
-
Parallel coin-tossing and constant-round secure two-party computation
-
LINDELL, Y. 2003. Parallel coin-tossing and constant-round secure two-party computation. J. Cryptol. 16, 3, 143-184.
-
(2003)
J. Cryptol.
, vol.16
, Issue.3
, pp. 143-184
-
-
Lindell, Y.1
-
43
-
-
33746437508
-
Privacy preserving data mining
-
LINDELL, Y. AND PINKAS, B. 2002. Privacy preserving data mining. J. Cryptol. 15, 3, 177-206.
-
(2002)
J. Cryptol.
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
44
-
-
33645970169
-
An oblivious transfer protocol with log-squared communication
-
J. Zhou and J. Lopez, Eds. Lecture Notes in Computer Science. Springer-Verlag
-
LIPMAA, H. 2005. An oblivious transfer protocol with log-squared communication. In Proceedings of the 8th Information Security Conference (ISC'05). J. Zhou and J. Lopez, Eds. Lecture Notes in Computer Science, vol. 3650. Springer-Verlag, 314-328.
-
(2005)
Proceedings of the 8th Information Security Conference (ISC'05)
, vol.3650
, pp. 314-328
-
-
Lipmaa, H.1
-
45
-
-
0003625461
-
-
M.S. thesis, Technion (Israel Institute of Technology), Haifa, Israel
-
MANN, E. 1998. Private access to distributed information. M.S. thesis, Technion (Israel Institute of Technology), Haifa, Israel.
-
(1998)
Private Access to Distributed Information
-
-
Mann, E.1
-
46
-
-
84974655726
-
Secure computation
-
Lecture Notes in Computer Science. Springer-Verlag
-
MICALI, S. AND ROGAWAY, P. 1991. Secure computation. In Advances in Cryptology (CRYPTO'91) Lecture Notes in Computer Science, vol. 576. Springer-Verlag, 392-404.
-
(1991)
Advances in Cryptology (CRYPTO'91)
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
48
-
-
0027641832
-
Small-bias probability spaces: Efficient constructions and applications
-
NAOR, J. AND NAOR, M. 1993. Small-bias probability spaces: efficient constructions and applications. SIAM J. Comput. 22, 4, 838-856.
-
(1993)
SIAM J. Comput.
, vol.22
, Issue.4
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
50
-
-
22044454088
-
Computationally secure oblivious transfer
-
NAOR, M. AND PINKAS, B. 2005. Computationally secure oblivious transfer. J. Cryptol. 18, 1, 1-35.
-
(2005)
J. Cryptol.
, vol.18
, Issue.1
, pp. 1-35
-
-
Naor, M.1
Pinkas, B.2
-
52
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Aiken Computation Laboratory, Harvard University, Cambridge, MA
-
RABIN, M.O. 1981. How to exchange secrets by oblivious transfer. Tech. rep. TR-81, Aiken Computation Laboratory, Harvard University, Cambridge, MA.
-
(1981)
Tech. Rep.
, vol.TR-81
-
-
Rabin, M.O.1
-
53
-
-
84947772655
-
A new and efficient all-or-nothing disclosure of secrets protocol
-
Lecture Notes in Computer Science. Springer-Verlag
-
STERN, J. P. 1998. A new and efficient all-or-nothing disclosure of secrets protocol. In Advances in Cryptology (ASIACRYPT'98) Lecture Notes in Computer Science, vol. 1514. Springer-Verlag, 357-371.
-
(1998)
Advances in Cryptology (ASIACRYPT'98)
, vol.1514
, pp. 357-371
-
-
Stern, J.P.1
|