-
1
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
ACM Press
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. Proceedings of STOC 1988, ACM Press, pp. 1-10.
-
Proceedings of STOC 1988
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
2
-
-
0000057495
-
Universal hashing and geometric codes
-
J. Bierbrauer. Universal Hashing and Geometric Codes. Designs, Codes and Cryptography, vol. 11, pp. 207-221, 1997.
-
(1997)
Designs, Codes and Cryptography
, vol.11
, pp. 207-221
-
-
Bierbrauer, J.1
-
3
-
-
85062838317
-
Safeguarding cryptographic keys
-
Proceedings of National Computer Conference '79
-
G. R. Blakley. Safeguarding cryptographic keys. Proceedings of National Computer Conference '79, volume 48 of AFIPS Proceedings, pp. 313-317, 1979.
-
(1979)
AFIPS Proceedings
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
9
-
-
33745168657
-
Blackbox secret sharing from primitive sets in algebraic number fields
-
Proceedings of CRYPTO 2005, Springer-Verlag
-
R. Cramer, S. Fehr, and M. Stam. Blackbox secret sharing from primitive sets in algebraic number fields. Proceedings of CRYPTO 2005, volume 3621 of LNCS, pp. 344-360, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 344-360
-
-
Cramer, R.1
Fehr, S.2
Stam, M.3
-
10
-
-
33745134732
-
On codes, matroids and secure multi-party computation from linear secret sharing schemes
-
Proceedings of CRYPTO 2005, Springer-Verlag
-
R. Cramer, V. Daza, I. Gracia, J. Jimenez Urroz, G. Leander, J. Martí-Farré, and C. Padró. On codes, matroids and secure multi-party computation from linear secret sharing schemes. Proceedings of CRYPTO 2005, volume 3621 of LNCS, pp. 327-343, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 327-343
-
-
Cramer, R.1
Daza, V.2
Gracia, I.3
Jimenez Urroz, J.4
Leander, G.5
Martí-Farré, J.6
Padró, C.7
-
12
-
-
35248883422
-
Efficient multi-party computation over rings
-
Proceedings of EUROCRYPT 2003, Springer-Verlag
-
R. Cramer, S. Fehr, Y. Ishai, and E. Kushilevitz. Efficient multi-party computation over rings. Proceedings of EUROCRYPT 2003, volume 2656 of LNCS, pp. 596-613, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 596-613
-
-
Cramer, R.1
Fehr, S.2
Ishai, Y.3
Kushilevitz, E.4
-
13
-
-
84937432976
-
Optimal black-box secret sharing over arbitrary Abelian groups
-
Proceedings of CRYPTO 2002, Springer-Verlag
-
R. Cramer and S. Fehr. Optimal black-box secret sharing over arbitrary Abelian groups. Proceedings of CRYPTO 2002, volume 2442 of LNCS, pp. 272-287, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 272-287
-
-
Cramer, R.1
Fehr, S.2
-
14
-
-
0033706246
-
On the complexity of verifiable secret sharing and multi-party computation
-
ACM Press
-
R. Cramer, I. Damgaard, and S. Dziembowski. On the complexity of verifiable secret sharing and multi-party computation. Proceedings of STOC 2000, ACM Press, pp. 325-334, 2000.
-
(2000)
Proceedings of STOC 2000
, pp. 325-334
-
-
Cramer, R.1
Damgaard, I.2
Dziembowski, S.3
-
15
-
-
84948975649
-
General secure multi-party computation from any linear secret sharing scheme
-
Proceedings of EUROCRYPT 2000, Springer-Verlag
-
R. Cramer, I. Damgaard, and U. Maurer. General secure multi-party computation from any linear secret sharing scheme. Proceedings of EUROCRYPT 2000, volume 1807 of LNCS, pp. 316-334, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 316-334
-
-
Cramer, R.1
Damgaard, I.2
Maurer, U.3
-
16
-
-
84957717648
-
Efficient multi-party computations secure against an adaptive adversary
-
Springer-Verlag
-
R. Cramer, I. Damgaard, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multi-party computations secure against an adaptive adversary. In Proceedings of EUROCRYPT 1999, volume 1592, Springer-Verlag, 1999.
-
(1999)
Proceedings of EUROCRYPT 1999
, vol.1592
-
-
Cramer, R.1
Damgaard, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
17
-
-
0000527282
-
Homomorphic zero-knowledge threshold schemes over any finite abelian group
-
Y. Desmedt and Y. Frankel. Homomorphic zero-knowledge threshold schemes over any finite abelian group. SIAM Journal of Discrete Mathematics, 7 (1994), pp. 667-679.
-
(1994)
SIAM Journal of Discrete Mathematics
, vol.7
, pp. 667-679
-
-
Desmedt, Y.1
Frankel, Y.2
-
18
-
-
33749542436
-
On sharing secrets and Reed-Solomon codes
-
November
-
R. J. McEliece and D. V. Sarvate. On sharing secrets and Reed-Solomon codes. Comm. of the ACM, 22(11), November 1979, pp. 612-613.
-
(1979)
Comm. of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
McEliece, R.J.1
Sarvate, D.V.2
-
21
-
-
0030511284
-
On the asymptotic behavior of some towers of function fields over finite fields
-
A. García and H. Stichtenoth. On the asymptotic behavior of some towers of function fields over finite fields. J. Number Theory, vol. 61, pp. 248-273, 1996.
-
(1996)
J. Number Theory
, vol.61
, pp. 248-273
-
-
García, A.1
Stichtenoth, H.2
-
22
-
-
0034384230
-
Tables of curves with many points
-
G. van der Geer and M. van der Vlugt. Tables of curves with many points Mathematics of Computation 69 (2000), 797-810. See also www.science.uva.nl/~geer for regular updates.
-
(2000)
Mathematics of Computation
, vol.69
, pp. 797-810
-
-
Van Der Geer, G.1
Van Der Vlugt, M.2
-
23
-
-
0000942249
-
Codes on algebraic curves
-
V.D. Goppa. Codes on algebraic curves. Soviet Math. Dokl. 24: 170-172, 1981.
-
(1981)
Soviet Math. Dokl.
, vol.24
, pp. 170-172
-
-
Goppa, V.D.1
-
25
-
-
84957057937
-
Coding constructions for blacklisting problems without computational assumptions
-
Springer-Verlag
-
R. Kumar, S. Rajagopalan, and A. Sahai. Coding constructions for blacklisting problems without computational assumptions. Proceedings of CRYPTO 1999, Springer-Verlag, pp. 609-623, 1999.
-
(1999)
Proceedings of CRYPTO 1999
, pp. 609-623
-
-
Kumar, R.1
Rajagopalan, S.2
Sahai, A.3
-
26
-
-
0034188404
-
Constructions of authentication codes from algebraic curves over finite fields
-
K. Y. Lam, H. X. Wang, and C. Xing. Constructions of authentication codes from algebraic curves over finite fields. IEEE Transactions in Information Theory, Vol. 46, 886-892, 2000.
-
(2000)
IEEE Transactions in Information Theory
, vol.46
, pp. 886-892
-
-
Lam, K.Y.1
Wang, H.X.2
Xing, C.3
-
27
-
-
0003956970
-
-
Addison-Wesley
-
S. Lang. Algebra. Addison-Wesley, 1997.
-
(1997)
Algebra
-
-
Lang, S.1
-
31
-
-
33749581169
-
Function fields over finite fields and their application to cryptography
-
A. Garcia and H. Stichtenoth (Ed.), Springer Verlag, to appear
-
H. Niederreiter, H. Wang, and C. Xing. Function fields over finite fields and their application to cryptography. In: A. Garcia and H. Stichtenoth (Ed.). Topics in geometry, coding theory and cryptography, Springer Verlag, to appear (2006).
-
(2006)
Topics in Geometry, Coding Theory and Cryptography
-
-
Niederreiter, H.1
Wang, H.2
Xing, C.3
-
32
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proc. ACM STOC 1989, pages 73-85, 1989.
-
(1989)
Proc. ACM STOC 1989
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
33
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Comm. of the ACM, 22(11):612-613, 1979.
-
(1979)
Comm. of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
35
-
-
0035442521
-
A low-complexity algorithm for the construction of algebraic-geometric codes better than the Gilbert-Varshamov bound
-
K.W. Shum, I. Aleshnikov, V.P. Kumar, H. Stichtenoth, V. Deolaikar. A low-complexity algorithm for the construction of algebraic-geometric codes better than the Gilbert-Varshamov bound. IEEE Trans. IT 47 (2001), no. 6, 2225-2241.
-
(2001)
IEEE Trans. IT
, vol.47
, Issue.6
, pp. 2225-2241
-
-
Shum, K.W.1
Aleshnikov, I.2
Kumar, V.P.3
Stichtenoth, H.4
Deolaikar, V.5
-
38
-
-
0032073871
-
A note on authentication codes from algebraic geometry
-
S. Vladuts. A note on authentication codes from algebraic geometry. IEEE Transactions in Information Theory 44, no. 3, pp. 1342-1345, 1998.
-
(1998)
IEEE Transactions in Information Theory
, vol.44
, Issue.3
, pp. 1342-1345
-
-
Vladuts, S.1
|