-
1
-
-
0035879575
-
A Fair and Efficient Solution to the Socialist Millionaires Problem
-
F. Boudot, B. Schoenmakers and J. Traor’e, “A Fair and Efficient Solution to the Socialist Millionaires’ Problem”, in Discrete Applied Mathematics, 111(1-2), pp. 23-36, 2001.
-
(2001)
Discrete Applied Mathematics
, vol.111
, Issue.1
, pp. 23-36
-
-
Boudot, F.1
Schoenmakers, B.2
Traor’E, J.3
-
2
-
-
84945124606
-
Multiparty Computation from Threshold Homomorphic Encryption
-
R.Cramer, I.Damgard, and J.Nielsen, “Multiparty Computation from Threshold Homomorphic Encryption”, in Advances in Cryptology - EUROCRYPT 2001, LNCS, Springer, vol. 2045, pp. 280-300, 2001.
-
(2001)
Advances in Cryptology - EUROCRYPT 2001, LNCS, Springer
, vol.2045
, pp. 280-300
-
-
Cramer, R.1
Damgard, I.2
Nielsen, J.3
-
4
-
-
0030150177
-
Comparing Information without Leaking It
-
R.Fagin, M.Naor, and P.Winkler, “Comparing Information without Leaking It”, in Communications of the ACM, 39(5): 77-85, 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
5
-
-
84879521412
-
Secure Multiparty Computation of Approximations
-
J.Feigenbaum, Y.Ishai, T.Malkin, K.Nissim, M.Strauss, and R.Wright, “Secure Multiparty Computation of Approximations”, in Proc. of the 28th International Colloquium on Automata, Languages and Programming (ICALP 2001), pp. 927-938, 2001.
-
(2001)
Proc. of the 28Th International Colloquium on Automata, Languages and Programming (ICALP 2001
, pp. 927-938
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.3
Nissim, K.4
Strauss, M.5
Wright, R.6
-
7
-
-
84946827596
-
Threshold Cryptosystems Secure against Chosenciphertext Attacks
-
P.Fouque and D.Pointcheval, “Threshold Cryptosystems Secure against Chosenciphertext Attacks”, in Proc. of Asiacrypt2001, pp. 351-368, 2001.
-
(2001)
Proc. of Asiacrypt
, vol.2001
, pp. 351-368
-
-
Fouque, P.1
Pointcheval, D.2
-
8
-
-
35048820609
-
Efficient Private Matching and Set Intersection
-
M.Freedman, K.Nissim and B.Pinkas, “Efficient Private Matching and Set Intersection”, in Proc. of Eurocrypt’04, LNCS, Springer, vol. 3027, pp. 1-19, 2004.
-
(2004)
Proc. of Eurocrypt’04, LNCS, Springer
, vol.3027
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
9
-
-
26444451487
-
On Secure Scalar Product Computation for Privacy-Preserving Data Mining
-
B.Goethals, S.Laur, H.Lipmaa, and T.Mielikainen, “On Secure Scalar Product Computation for Privacy-Preserving Data Mining”, in Proc. of ICISC, 2004.
-
(2004)
Proc. of ICISC
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
12
-
-
0023545076
-
How to Play Any Mental Game
-
O.Goldreich, S.Micali, and A.Wigderson, “How to Play Any Mental Game”, in Proc.of19thSTOC, pp. 218-229, 1987.
-
(1987)
Proc.Of19thstoc
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
13
-
-
0141515461
-
On the Distribution of the Number of Roots of Polynomials and Explicit Weak Designs
-
T.Hartman and R.Raz, “On the Distribution of the Number of Roots of Polynomials and Explicit Weak Designs”, in Random Structures and Algorithms, Vol.23 (3), pp. 235 - 263, 2003.
-
(2003)
Random Structures and Algorithms
, vol.23
, Issue.3
-
-
Hartman, T.1
Raz, R.2
-
15
-
-
33745565439
-
Polylogarithmic Private Approximations and Efficient Matching
-
P.Indyk and D.Woodruff, “Polylogarithmic Private Approximations and Efficient Matching”, in Proc. of the Third Theory of Cryptography Conference (TCC 2006), LNCS, Springer, vol. 3876, pp. 245-264, 2006.
-
(2006)
Proc. of the Third Theory of Cryptography Conference (TCC 2006), LNCS, Springer
, vol.3876
, pp. 245-264
-
-
Indyk, P.1
Woodruff, D.2
-
16
-
-
84937417083
-
Mix and Match: Secure Function Evaluation via Ciphertexts
-
M.Jakobsson, A.Juels, “Mix and Match: Secure Function Evaluation via Ciphertexts”, in ASIACRYPT2000, pp 162-177, 2000.
-
(2000)
ASIACRYPT
, vol.2000
, pp. 162-177
-
-
Jakobsson, M.1
Juels, A.2
-
17
-
-
26444553355
-
Testing disjointness of private datasets
-
Springer
-
A.Kiayias and A.Mitrofanova, “Testing disjointness of private datasets”, in Proc. of Financial Cryptography (FC 2005), LNCS, Springer, vol. 3570, pp. 109C124, 2005.
-
(2005)
Proc. of Financial Cryptography (FC 2005), LNCS
, vol.3570
-
-
Kiayias, A.1
Mitrofanova, A.2
-
18
-
-
33745160750
-
Privacy-Preserving Set Operations
-
L.Kissner and D.Song, “Privacy-Preserving Set Operations”, in Advances in Cryptology - CRYPTO 2005, LNCS, Springer, vol.3621, pp. 241-257, 2005.
-
(2005)
Advances in Cryptology - CRYPTO 2005, LNCS, Springer
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
19
-
-
0345058962
-
Verifiable Homomorphic Oblivious Transfer and private Equality Test
-
H.Lipmaa, “Verifiable Homomorphic Oblivious Transfer and private Equality Test”, in Advances in Cryptography ASIACRYPT2003, pp. 416-433, 2003.
-
(2003)
Advances in Cryptography ASIACRYPT
, pp. 416-433
-
-
Lipmaa, H.1
-
21
-
-
0000277371
-
Public-key Cryptosystems based on Composite Degree Residuosity Classes
-
P.Paillier, “Public-key Cryptosystems based on Composite Degree Residuosity Classes”, in Proc. of Asiacrypt2000, pp. 573-584, 2000.
-
(2000)
Proc. of Asiacrypt
, vol.2000
, pp. 573-584
-
-
Paillier, P.1
-
22
-
-
84990648258
-
Efficient Generation of Random Nonsingular Matrices
-
D.Randall, “Efficient Generation of Random Nonsingular Matrices”, in Random Structures and Algorithms, vol. 4(1), pp. 111-118, 1993.
-
(1993)
Random Structures and Algorithms
, vol.4
, Issue.1
, pp. 111-118
-
-
Randall, D.1
-
23
-
-
39049098515
-
Design and Analysis of a Self-tuning Proportional and Integral Controller for Active Queue Management Routers to support TCP Flows
-
N.Xiong, X.Defago, X.Jia, Y.Yang, and Y.He, “Design and Analysis of a Self-tuning Proportional and Integral Controller for Active Queue Management Routers to support TCP Flows”, in Proc. of IEEE INFOCOM, 2006.
-
(2006)
Proc. of IEEE INFOCOM
-
-
Xiong, N.1
Defago, X.2
Jia, X.3
Yang, Y.4
He, Y.5
|