-
2
-
-
35248899190
-
-
A. Beimel and Y. Stahl. Robust Information-Theoretic Private Information Retrieval. In Third Conference on Security in Communication Networks, Lecture Notes in Computer Science 2576, pages 326-341. Springer-Verlag, 2002.
-
A. Beimel and Y. Stahl. Robust Information-Theoretic Private Information Retrieval. In Third Conference on Security in Communication Networks, Lecture Notes in Computer Science 2576, pages 326-341. Springer-Verlag, 2002.
-
-
-
-
4
-
-
0029541045
-
Private Information Retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private Information Retrieval. In 36th Annual Symposium on Foundations of Computer Science, pages 41-50, 1995.
-
(1995)
36th Annual Symposium on Foundations of Computer Science
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
5
-
-
84937574654
-
A Random Server Model for Private Information Retrieval
-
Springer-Verlag
-
Y. Gertner, S. Goldwasser, and T. Malkin. A Random Server Model for Private Information Retrieval. In 2nd International Workshop on Randomization and Approximation Techniques in Computer Science, Lecture Notes in Computer Science 1518, pages 200-217. Springer-Verlag, 1998.
-
(1998)
2nd International Workshop on Randomization and Approximation Techniques in Computer Science, Lecture Notes in Computer Science
, vol.1518
, pp. 200-217
-
-
Gertner, Y.1
Goldwasser, S.2
Malkin, T.3
-
6
-
-
34548780603
-
-
project on SourceForge
-
I. Goldberg. Percy++ project on SourceForge. http://percy.sourceforge. net/.
-
Percy
-
-
Goldberg, I.1
-
7
-
-
0033183669
-
Improved Decoding of Reed-Solomon and Algebraic-Geometry Codes
-
September
-
V. Guruswami and M. Sudan. Improved Decoding of Reed-Solomon and Algebraic-Geometry Codes. IEEE Transactions on Information Theory, 45(6):1757-1767, September 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.6
, pp. 1757-1767
-
-
Guruswami, V.1
Sudan, M.2
-
8
-
-
0031378815
-
Replication is Not Needed: Single Database, Computationally Private Information Retrieval
-
October
-
E. Kushilevitz and R. Ostrovsky. Replication is Not Needed: Single Database, Computationally Private Information Retrieval. In 38th Annual Symposium on Foundations of Computer Science, pages 364-373, October 1997.
-
(1997)
38th Annual Symposium on Foundations of Computer Science
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
9
-
-
24144474940
-
-
S. Micali, C. Peikert, M. Sudan, and D. A. Wilson. Optimal Error Correction Against Computationally Bounded Noise. In Theory of Cryptography, Second Theory of Cryptography Conference, Lecture Notes in Computer Science 3378, pages 1-16. Springer-Verlag, February 2005.
-
S. Micali, C. Peikert, M. Sudan, and D. A. Wilson. Optimal Error Correction Against Computationally Bounded Noise. In Theory of Cryptography, Second Theory of Cryptography Conference, Lecture Notes in Computer Science 3378, pages 1-16. Springer-Verlag, February 2005.
-
-
-
-
10
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Advances in Cryptology, Eurocrypt '99, Springer-Verlag
-
P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - Eurocrypt '99, Lecture Notes in Computer Science 1592, pages 223-238. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
12
-
-
34548810068
-
The Byzantine Postman Problem: A Trivial Attack against PIR-based Nym Servers
-
Technical Report ESAT-COSIC 2007-001, Katholieke Universiteit Leuven, February
-
L. Sassaman and B. Preneel. The Byzantine Postman Problem: A Trivial Attack against PIR-based Nym Servers. Technical Report ESAT-COSIC 2007-001, Katholieke Universiteit Leuven, February 2007.
-
(2007)
-
-
Sassaman, L.1
Preneel, B.2
-
14
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. How to Share a Secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
16
-
-
0024141971
-
How to Share a Secret with Cheaters
-
M. Tompa and H. Woll. How to Share a Secret with Cheaters. J. Cryptology, 1(2):133-138, 1988.
-
(1988)
J. Cryptology
, vol.1
, Issue.2
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
-
17
-
-
0036387035
-
-
E. Y. Yang, J. Xu, and K. H. Bennett. Private Information Retrieval in the Presence of Malicious Failures. In Computer Software and Applications Conference 2002 COMPSAC 2002, August 2002
-
E. Y. Yang, J. Xu, and K. H. Bennett. Private Information Retrieval in the Presence of Malicious Failures. In Computer Software and Applications Conference 2002 (COMPSAC 2002), August 2002.
-
-
-
|