-
2
-
-
85043768965
-
General public key cryptosystems and mental poker protocols
-
ser. Lecture Notes in Computer Science, I. B. Damgård, Ed. Springer-Verlag
-
K. Kurosawa, Y. Katayama, W. Ogata, and S. Tsujii, "General public key cryptosystems and mental poker protocols," in Advances in Cryptology - Eurocrypt '90, ser. Lecture Notes in Computer Science, I. B. Damgård, Ed., vol. 473. Springer-Verlag, 1990, pp. 374-388.
-
(1990)
Advances in Cryptology - Eurocrypt '90
, vol.473
, pp. 374-388
-
-
Kurosawa, K.1
Katayama, Y.2
Ogata, W.3
Tsujii, S.4
-
3
-
-
84945273372
-
Efficient mental card shuffling via optimised arbitrary-sized benes permutation network
-
ser. Lecture Notes in Computer Science. Springer-Verlag
-
W. Soo, A. Samsudin, and A. Goh, "Efficient mental card shuffling via optimised arbitrary-sized benes permutation network," in Information Security Conference, ser. Lecture Notes in Computer Science, vol. 2433. Springer-Verlag, 2002, pp. 446-458.
-
(2002)
Information Security Conference
, vol.2433
, pp. 446-458
-
-
Soo, W.1
Samsudin, A.2
Goh, A.3
-
4
-
-
0347526084
-
Practical mental poker without a ttp based on homomorphic encryption
-
ser. Lecture Notes in Computer Science, T. Johansson and S. Maitra, Eds. Berlin: Springer-Verlag
-
J. Castellà-Roca, J. Domingo-Ferrer, A. Riera, and J. Borrell, "Practical mental poker without a ttp based on homomorphic encryption," in Progress in Cryptology-Indocrypt'2003, ser. Lecture Notes in Computer Science, T. Johansson and S. Maitra, Eds., no. 2904. Berlin: Springer-Verlag, 2003, pp. 280-294.
-
(2003)
Progress in Cryptology-Indocrypt'2003
, Issue.2904
, pp. 280-294
-
-
Castellà-Roca, J.1
Domingo-Ferrer, J.2
Riera, A.3
Borrell, J.4
-
5
-
-
35248895872
-
Mental poker revisited
-
ser. Lecture Notes in Computer Science. Springer-Verlag, December
-
A. Bamett and N. Smart, "Mental poker revisited," in Proc. Cryptography and Coding, ser. Lecture Notes in Computer Science, vol. 2898. Springer-Verlag, December 2003, pp. 370-383.
-
(2003)
Proc. Cryptography and Coding
, vol.2898
, pp. 370-383
-
-
Bamett, A.1
Smart, N.2
-
6
-
-
0005301490
-
On data banks and privacy homomorphisms
-
R. DeMillo, Ed. New York: Academic Press
-
R. Rivest, L. Adleman, and M. Dertouzos, "On data banks and privacy homomorphisms," in Foundations of Secure Computation, R. DeMillo, Ed. New York: Academic Press, 1978, pp. 169-179.
-
(1978)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.1
Adleman, L.2
Dertouzos, M.3
-
7
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. 31, pp. 469-472, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
8
-
-
0030577321
-
A new privacy homomorphism and applications
-
December [Online]. Available: citeseer.nj.nec.com/290190.html
-
J. Domingo-Ferrer, "A new privacy homomorphism and applications," Information Processing Letters, vol. 60, no. 5, pp. 277-282, December 1996. [Online]. Available: citeseer.nj.nec.com/290190.html
-
(1996)
Information Processing Letters
, vol.60
, Issue.5
, pp. 277-282
-
-
Domingo-Ferrer, J.1
-
9
-
-
84945300542
-
A provably secure additive and multiplicative privacy homomorphishm
-
ser. Lecture Notes in Computer Science, A. Chan and V. Gligor, Eds. Springer Verlag
-
J. Domingo-Ferrer, "A provably secure additive and multiplicative privacy homomorphishm," in Information Security, ser. Lecture Notes in Computer Science, A. Chan and V. Gligor, Eds., vol. 2433. Springer Verlag, 2002, pp. pp. 471-483.
-
(2002)
Information Security
, vol.2433
, pp. 471-483
-
-
Domingo-Ferrer, J.1
-
11
-
-
84945299487
-
A secure poker protocol that minimizes the effect of player coalitions
-
ser. Lecture Notes in Computer Science, H. C. Williams, Ed. Berlin: Springer-Verlag
-
C. Crépeau, "A secure poker protocol that minimizes the effect of player coalitions," in Advances in Cryptology - Crypto '85, ser. Lecture Notes in Computer Science, H. C. Williams, Ed., vol. 218. Berlin: Springer-Verlag, 1985, pp. 73-86.
-
(1985)
Advances in Cryptology - Crypto '85
, vol.218
, pp. 73-86
-
-
Crépeau, C.1
-
12
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
M. Goldwasser, S. Micali, and C. Rackoff, "The knowledge complexity of interactive proof systems," SIAM Journal of Computing, vol. 18, no. 1, pp. 186-208, 1989.
-
(1989)
SIAM Journal of Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, M.1
Micali, S.2
Rackoff, C.3
-
13
-
-
0020543282
-
On secret sharing systems
-
E. Kamin, J. Green, and M. Hellman, "On secret sharing systems," IEEE Trans. Information Theory, vol. IT-29, no. 1, pp. 35-41, 1983.
-
(1983)
IEEE Trans. Information Theory
, vol.IT-29
, Issue.1
, pp. 35-41
-
-
Kamin, E.1
Green, J.2
Hellman, M.3
-
14
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," in Communications of the ACM, vol. 22, 1979, pp. 612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
16
-
-
84942550998
-
Public key cryptosystems based on composite residue classes
-
ser. Lecture Notes in Computer Science. Springer-Verlag
-
P. Paillier, "Public key cryptosystems based on composite residue classes," in Advances in Cryptology - EuroCrypt'99, ser. Lecture Notes in Computer Science, vol. 1592. Springer-Verlag, 1999, pp. 223-238.
-
(1999)
Advances in Cryptology - EuroCrypt'99
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
17
-
-
84888252697
-
All-or-nothing disclosure of secrets
-
ser. Lecture Notes in Computer Science. Springer-Verlag
-
G. Brassard, C. Crépeau, and J. Robert, "All-or-nothing disclosure of secrets," in Advances in Cryptology Crypto'86, ser. Lecture Notes in Computer Science, vol. 263. Springer-Verlag, 1986, pp. 234-238.
-
(1986)
Advances in Cryptology Crypto'86
, vol.263
, pp. 234-238
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.3
|