-
1
-
-
84945134014
-
Priced Oblivious Transfer: How to Sell Digital Goods
-
Advances in Cryptology, EUROCRYPT 2001, of, Springer-Verlag
-
William Aiello, Yuval Ishai, and Orner Reingold. Priced Oblivious Transfer: How to Sell Digital Goods. In Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, 2001. Springer-Verlag.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
24144433396
-
Evaluating 2-DNF Formulas on Ciphertexts
-
The Second Theory of Cryptography Conference, TCC 2005, of, Springer Verlag
-
Dan Boneh, Eu-Jin Goh, and Kobbi Nissim. Evaluating 2-DNF Formulas on Ciphertexts. In The Second Theory of Cryptography Conference, TCC 2005, volume 3378 of Lecture Notes in Computer Science, 2005. Springer Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3378
-
-
Boneh, D.1
Goh, E.2
Nissim, K.3
-
3
-
-
35048846561
-
Strong Conditional Oblivious Transfer and Computing on Intervals
-
Advances on Cryptology, ASIACRYPT 2004, of, Springer-Verlag
-
Ian F. Blake and Vladimir Kolesnikov. Strong Conditional Oblivious Transfer and Computing on Intervals. In Advances on Cryptology - ASIACRYPT 2004, volume 3329 of Lecture Notes in Computer Science, 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3329
-
-
Blake, I.F.1
Kolesnikov, V.2
-
4
-
-
85027202957
-
Generalized Secret Sharing and Monotone Functions
-
Advances in Cryptology-CRYPTO '88, of, Springer-Verlag
-
Josh Benaloh and Jerry Leichter. Generalized Secret Sharing and Monotone Functions. In Advances in Cryptology-CRYPTO '88, volume 403 of Lecture Notes in Computer Science, 1988. Springer-Verlag, 1990.
-
(1988)
Lecture Notes in Computer Science
, vol.403
-
-
Benaloh, J.1
Leichter, J.2
-
5
-
-
84957375076
-
A Secure and Optimally Efficient Multi-Authority Election Scheme
-
Advances in Cryptology, EUROCRYPT '97, of, Springer-Verlag
-
Ronald Cramer, Rosario Gennaro, and Berry Schoenmakers. A Secure and Optimally Efficient Multi-Authority Election Scheme. In Advances in Cryptology - EUROCRYPT '97, volume 1233 of Lecture Notes in Computer Science, 1997. Springer-Verlag.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
6
-
-
35048871699
-
Single Database Private Information Retrieval with Logarithmic Communication
-
The 9th Australasian Conference on Information Security and Privacy ACISP 2004, of, Springer-Verlag
-
Yan-Cheng Chang. Single Database Private Information Retrieval with Logarithmic Communication. In The 9th Australasian Conference on Information Security and Privacy (ACISP 2004), volume 3108 of Lecture Notes in Computer Science, 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3108
-
-
Chang, Y.1
-
7
-
-
84867553981
-
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
-
Public Key Cryptography 2001, of, Springer-Verlag
-
Ivan Damgård and Mads Jurik. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In Public Key Cryptography 2001, volume 1992 of Lecture Notes in Computer Science, 2001. Springer-Verlag.
-
(2001)
Lecture Notes in Computer Science
, vol.1992
-
-
Damgård, I.1
Jurik, M.2
-
8
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Taher Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
-
-
Elgamal, T.1
-
9
-
-
84937542853
-
Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires
-
Topics in Cryptology, CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, of, Springer-Verlag
-
Marc Fischlin. A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires. In Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, volume 2020 of Lecture Notes in Computer Science, 2001. Springer-Verlag.
-
(2001)
Lecture Notes in Computer Science
, vol.2020
-
-
Marc Fischlin, A.1
-
10
-
-
35048820609
-
Efficient Private Matching and Set Intersection
-
Advances in Cryptology, EUROCRYPT 2004, of, Springer-Verlag
-
Michael J. Freedman, Kobbi Nissim, and Benny Pinkas. Efficient Private Matching and Set Intersection. In Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
11
-
-
0034205020
-
Protecting Data Privacy in Private Information Retrieval Schemes
-
June
-
Yael Gertner, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. Protecting Data Privacy in Private Information Retrieval Schemes. Journal of Computer and System Sciences, 60(3), June 2000.
-
(2000)
Journal of Computer and System Sciences
, vol.60
, Issue.3
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
12
-
-
24944523186
-
On Private Scalar Product Computation for Privacy-Preserving Data Mining
-
Information Security and Cryptology, ICISC 2004, of, Springer-Verlag
-
Bart Goethals, Sven Laur, Helger Lipmaa, and Taneli Mielikäinen. On Private Scalar Product Computation for Privacy-Preserving Data Mining. In Information Security and Cryptology - ICISC 2004, volume 3506 of Lecture Notes in Computer Science, 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3506
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikäinen, T.4
-
14
-
-
26444512068
-
Single-Database Private Information Retrieval with Constant Communication Rate
-
The 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005, of, Springer-Verlag
-
Craig Gentry and Zulfikar Ramzan. Single-Database Private Information Retrieval with Constant Communication Rate. In The 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005, volume 3580 of Lecture Notes in Computer Science, 2005. Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3580
-
-
Gentry, C.1
Ramzan, Z.2
-
15
-
-
24944473997
-
Smooth Projective Hashing and Two-Message Oblivious Transfer
-
Advances in Cryptology, EUROCRYPT 2005, of, Springer-Verlag
-
Yael Tauman Kalai. Smooth Projective Hashing and Two-Message Oblivious Transfer. In Advances in Cryptology - EUROCRYPT 2005, volume 3494 of Lecture Notes in Computer Science, 2005. Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
-
-
Tauman Kalai, Y.1
-
16
-
-
33745160750
-
Privacy-Preserving Set Operations
-
Advances in Cryptology, CRYPTO 2005, 25th Annual International Cryptology Conference, of, Springer-Verlag
-
Lea Kissner and Dawn Song. Privacy-Preserving Set Operations. In Advances in Cryptology - CRYPTO 2005, 25th Annual International Cryptology Conference, volume 3621 of Lecture Notes in Computer Science, 2005. Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
-
-
Kissner, L.1
Song, D.2
-
17
-
-
38049032240
-
Secure Vickrey Auctions without Threshold Trust
-
Financial Cryptography, Sixth International Conference, of, Springer-Verlag
-
Helger Lipmaa, N. Asokan, and Valtteri Niemi. Secure Vickrey Auctions without Threshold Trust. In Financial Cryptography - Sixth International Conference, volume 2357 of Lecture Notes in Computer Science, 2002. Springer-Verlag.
-
(2002)
Lecture Notes in Computer Science
, vol.2357
-
-
Helger Lipmaa, N.A.1
Niemi, V.2
-
18
-
-
0001258323
-
Factoring integers with Elliptic Curves
-
Hendrik W. Lenstra, Jr. Factoring integers with Elliptic Curves. Annals of Mathematics, 126(2), 1987.
-
(1987)
Annals of Mathematics
, vol.126
, Issue.2
-
-
Lenstra Jr., H.W.1
-
19
-
-
33645970169
-
An Oblivious Transfer Protocol with Log-Squared Communication
-
The 8th Information Security Conference ISC'05, of, Springer-Verlag
-
Helger Lipmaa. An Oblivious Transfer Protocol with Log-Squared Communication. In The 8th Information Security Conference (ISC'05), volume 3650 of Lecture Notes in Computer Science, 2005. Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3650
-
-
Lipmaa, H.1
-
20
-
-
33646728872
-
Private Itemset Support Counting
-
Information and Communications Security, 7th International Conference, ICICS 2005, of, Springer-Verlag
-
Sven Laur, Helger Lipmaa, and Tanel Mielikäinen. Private Itemset Support Counting. In Information and Communications Security, 7th International Conference, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, 2005. Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3783
-
-
Laur, S.1
Lipmaa, H.2
Mielikäinen, T.3
-
22
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Advances in Cryptology, EUROCRYPT '99, of, Springer-Verlag
-
Pascal Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, 1999. Springer-Verlag.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
-
-
Paillier, P.1
-
23
-
-
84947772655
-
A New and Efficient All or Nothing Disclosure of Secrets Protocol
-
Advances on Cryptology, ASIACRYPT '98, of, Springer-Verlag
-
Julien P. Stern. A New and Efficient All or Nothing Disclosure of Secrets Protocol. In Advances on Cryptology - ASIACRYPT '98, volume 1514 of Lecture Notes in Computer Science, 1998. Springer-Verlag.
-
(1998)
Lecture Notes in Computer Science
, vol.1514
-
-
Stern, J.P.1
-
26
-
-
38049014256
-
-
Paul Zimmermann and Bruce Dodson. 20 Years of ECM. In The Algorithmic Number Theory Symposium, 4076 of Lecture Notes in Computer Science, 2006. Springer-Verlag.
-
Paul Zimmermann and Bruce Dodson. 20 Years of ECM. In The Algorithmic Number Theory Symposium, volume 4076 of Lecture Notes in Computer Science, 2006. Springer-Verlag.
-
-
-
-
27
-
-
38049041837
-
-
Paul Zimmermann. Optimal Parameters for ECM. Available at http://www.loria.fr/~zimmerma/records/ecm/params.html, as of May, 2006.
-
Paul Zimmermann. Optimal Parameters for ECM. Available at http://www.loria.fr/~zimmerma/records/ecm/params.html, as of May, 2006.
-
-
-
|