-
1
-
-
85029542707
-
Foundations of secure interactive computing
-
Advances in Cryptology, CRYPTO '91, of, Springer-Verlag
-
D. Beaver. Foundations of secure interactive computing. In Advances in Cryptology - CRYPTO '91, volume 1233 of LNCS, pages 377-391. Springer-Verlag, 1992.
-
(1992)
LNCS
, vol.1233
, pp. 377-391
-
-
Beaver, D.1
-
2
-
-
84928743703
-
Precomputing oblivious transfer
-
Advances in Cryptology, EUROCRYPT '95, of, Springer-Verlag
-
D. Beaver. Precomputing oblivious transfer. In Advances in Cryptology - EUROCRYPT '95, volume 963 of LNCS, pages 97-109. Springer-Verlag, 1995.
-
(1995)
LNCS
, vol.963
, pp. 97-109
-
-
Beaver, D.1
-
3
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer. Generalized privacy amplification. IEEE Transactions on Information Theory, 41, 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
4
-
-
84969361843
-
Practical quantum oblivious transfer
-
Advances in Cryptology, CRYPTO '91, of, Springer
-
C. H. Bennett, G. Brassard, C. Crépeau, and H. Skubiszewska. Practical quantum oblivious transfer. In Advances in Cryptology - CRYPTO '91, volume 576 of LNCS, pages 351-366. Springer, 1992.
-
(1992)
LNCS
, vol.576
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, H.4
-
5
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert. Privacy amplification by public discussion. SIAM Journal on Computing, 17(2):210-229, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
6
-
-
84957360961
-
Oblivious transfers and privacy amplification
-
Advances in Cryptology -EUROCRYPT '97, of, Springer-Verlag
-
G. Brassard and C. Crépeau. Oblivious transfers and privacy amplification. In Advances in Cryptology -EUROCRYPT '97, volume 1233 of LNCS, pages 334-347. Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 334-347
-
-
Brassard, G.1
Crépeau, C.2
-
7
-
-
21144437147
-
Oblivious transfers and privacy amplification
-
G. Brassard, C. Crépeau, and S. Wolf. Oblivious transfers and privacy amplification. Journal of Cryptology, 16(4):219-237, 2003.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.4
, pp. 219-237
-
-
Brassard, G.1
Crépeau, C.2
Wolf, S.3
-
8
-
-
84957712978
-
On the foundations of oblivious transfer
-
Advances in Cryptology -EUROCRYPT '98, of, Springer-Verlag
-
C. Cachin. On the foundations of oblivious transfer. In Advances in Cryptology -EUROCRYPT '98, volume 1403 of LNCS, pages 361-374. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1403
, pp. 361-374
-
-
Cachin, C.1
-
9
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
11
-
-
84957356475
-
Efficient cryptographic protocols based on noisy channels
-
Advances in Cryptology, CRYPTO '97, of, Springer-Verlag
-
C. Crépeau. Efficient cryptographic protocols based on noisy channels. In Advances in Cryptology - CRYPTO '97, volume 1233 of LNCS, pages 306-317. Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 306-317
-
-
Crépeau, C.1
-
13
-
-
23944515855
-
Efficient unconditional oblivious transfer from almost any noisy channel
-
Proceedings of Fourth Conference on Security in Communication Networks SCN, of, Springer-Verlag
-
C. Crépeau, K. Morozov, and S. Wolf. Efficient unconditional oblivious transfer from almost any noisy channel. In Proceedings of Fourth Conference on Security in Communication Networks (SCN), volume 3352 of LNCS, pages 47-59. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3352
, pp. 47-59
-
-
Crépeau, C.1
Morozov, K.2
Wolf, S.3
-
14
-
-
33746082048
-
-
C. Crépeau, G. Savvides, C. Schaffner, and J. Wullschleger. Information-theoretic conditions for two-party secure function evaluation. In Advances in Cryptology - EUROCRYPT '06, 4004 of LNCS, pages 538-554. Springer-Verlag, 2006. Full version available at http://eprint.iacr. org/2006/183.
-
C. Crépeau, G. Savvides, C. Schaffner, and J. Wullschleger. Information-theoretic conditions for two-party secure function evaluation. In Advances in Cryptology - EUROCRYPT '06, volume 4004 of LNCS, pages 538-554. Springer-Verlag, 2006. Full version available at http://eprint.iacr. org/2006/183.
-
-
-
-
15
-
-
26444482584
-
Unfair noisy channels and oblivious transfer
-
Theory of Cryptography Conference, TCC '04, of, Springer-Verlag
-
I. Damgård, S. Fehr, K. Morozov, and L. Salvail. Unfair noisy channels and oblivious transfer. In Theory of Cryptography Conference - TCC '04, volume 2951 of LNCS, pages 355-373. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.2951
, pp. 355-373
-
-
Damgård, I.1
Fehr, S.2
Morozov, K.3
Salvail, L.4
-
16
-
-
33748633496
-
Cryptography in the bounded quantum-storage model
-
IEEE Computer Society
-
I. Damgard, S. Fehr, L. Salvail, and C. Schaffner. Cryptography in the bounded quantum-storage model. In Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS '05), pages 449-458. IEEE Computer Society, 2005.
-
(2005)
Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS '05)
, pp. 449-458
-
-
Damgard, I.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
17
-
-
84957697395
-
On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
-
Advances in Cryptology, EUROCRYPT '99, of, Springer-Verlag
-
I. Damgård, J. Kilian, and L. Salvail. On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In Advances in Cryptology - EUROCRYPT '99, volume 1592 of LNCS, pages 56-73. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 56-73
-
-
Damgård, I.1
Kilian, J.2
Salvail, L.3
-
18
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Commun. ACM, 28(6):637-647, 1985.
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
20
-
-
24944508356
-
Implementing oblivious transfer using collection of dense trapdoor permutations
-
Theory of Cryptography Conference, TCC '04, of, Springer-Verlag
-
I. Haitner. Implementing oblivious transfer using collection of dense trapdoor permutations. In Theory of Cryptography Conference - TCC '04, volume 2951 of LNCS, pages 394-409. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.2951
, pp. 394-409
-
-
Haitner, I.1
-
21
-
-
33749559476
-
On the power of the randomized iterate
-
Advances in Cryptology, CRYPTO '06, of, Springer-Verlag
-
I. Haitner, D. Harnik, and O. Reingold. On the power of the randomized iterate. In Advances in Cryptology - CRYPTO '06, volume 4117 of LNCS, pages 21-40. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4117
, pp. 21-40
-
-
Haitner, I.1
Harnik, D.2
Reingold, O.3
-
22
-
-
24944472289
-
On robust combiners for oblivious transfer and other primitives
-
Advances in Cryptology, EUROCRYPT '05, of
-
D. Harnik, J. Kilian, M. Naor, O. Reingold, and A. Rosen. On robust combiners for oblivious transfer and other primitives. In Advances in Cryptology - EUROCRYPT '05, volume 3494 of LNCS, pages 96-113, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 96-113
-
-
Harnik, D.1
Kilian, J.2
Naor, M.3
Reingold, O.4
Rosen, A.5
-
23
-
-
4544297111
-
Completeness in two-party secure computation: A computational view
-
ACM Press
-
D. Harnik, M. Naor, O. Reingold, and A. Rosen. Completeness in two-party secure computation: a computational view. In Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC '04), pages 252-261. ACM Press, 2004.
-
(2004)
Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC '04)
, pp. 252-261
-
-
Harnik, D.1
Naor, M.2
Reingold, O.3
Rosen, A.4
-
25
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999.
-
(1999)
SIAM J. Comput
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
28
-
-
38049119127
-
-
. Reprint as 7 of ETH Series in Information Security and Cryptography, Hartung-Gorre Verlag.
-
. Reprint as vol. 7 of ETH Series in Information Security and Cryptography, Hartung-Gorre Verlag.
-
-
-
-
29
-
-
33745169714
-
One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption
-
Advances in Cryptology, CRYPTO '05, of, Springer-Verlag
-
T. Holenstein and R. Renner. One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption. In Advances in Cryptology - CRYPTO '05, volume 3621 of LNCS, pages 478-493. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 478-493
-
-
Holenstein, T.1
Renner, R.2
-
34
-
-
38049022468
-
Robuster combiners for oblivious transfer
-
Theory of Cryptography Conference, TCC '07, Springer-Verlag
-
R. Meier, B. Przydatek, and J. Wullschleger. Robuster combiners for oblivious transfer. In Theory of Cryptography Conference - TCC '07, LNCS. Springer-Verlag, 2007.
-
(2007)
LNCS
-
-
Meier, R.1
Przydatek, B.2
Wullschleger, J.3
-
35
-
-
84974655726
-
Secure computation (abstract)
-
Advances in Cryptology, CRYPTO '91, of, Springer-Verlag
-
S. Micali and P. Rogaway. Secure computation (abstract). In Advances in Cryptology - CRYPTO '91, volume 576 of LNCS, pages 392-404. Springer-Verlag, 1992.
-
(1992)
LNCS
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
37
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Technical Report TR-81, Harvard Aiken Computation Laboratory
-
M. O. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory, 1981.
-
(1981)
-
-
Rabin, M.O.1
-
38
-
-
0006629701
-
Manipulating statistical difference
-
Randomization Methods in Algorithm Design DIMACS Workshop '97, of, American Mathematical Society
-
A. Sahai and S. Vadhan. Manipulating statistical difference. In Randomization Methods in Algorithm Design (DIMACS Workshop '97), volume 43 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, pages 251-270. American Mathematical Society, 1999.
-
(1999)
DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, vol.43
, pp. 251-270
-
-
Sahai, A.1
Vadhan, S.2
-
40
-
-
0001998264
-
Conjugate coding
-
1
-
S. Wiesner. Conjugate coding. SIGACT News, 15(1):78-88, 1983.
-
(1983)
SIGACT News
-
-
Wiesner, S.1
|