-
1
-
-
84945134014
-
Priced Oblivious Transfer: How to Sell Digital Goods
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Aiello, W., Ishai, Y., Reingold, O.: Priced Oblivious Transfer: How to Sell Digital Goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 119-135. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 119-135
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
35048875418
-
Secure Computation of the kth-Ranked Element
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Aggarwal, G., Mishra, N., Pinkas, B.: Secure Computation of the kth-Ranked Element. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 40-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 40-55
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
3
-
-
38049082907
-
-
Aumann, Y., Lindell, Y.: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 137-156. Springer, Heidelberg (2007)
-
Aumann, Y., Lindell, Y.: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
-
-
-
-
4
-
-
4544230984
-
Strict Polynomial-Time in Simulation and Extraction
-
Barak, B., Lindell, Y.: Strict Polynomial-Time in Simulation and Extraction. SIAM Journal on Computing 33(4), 783-818 (2004)
-
(2004)
SIAM Journal on Computing
, vol.33
, Issue.4
, pp. 783-818
-
-
Barak, B.1
Lindell, Y.2
-
5
-
-
85029542707
-
Foundations of Secure Interactive Computing
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Beaver, D.: Foundations of Secure Interactive Computing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 377-391. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 377-391
-
-
Beaver, D.1
-
6
-
-
38049132285
-
Simulatable Adaptive Oblivious Transfer
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Camenisch, J., Neven, G., Shelat, A.: Simulatable Adaptive Oblivious Transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 573-590. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 573-590
-
-
Camenisch, J.1
Neven, G.2
Shelat, A.3
-
7
-
-
0000731055
-
Security and Composition of Multiparty Cryptographic Protocols
-
Canetti, R.: Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
8
-
-
84947267092
-
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
9
-
-
35048839833
-
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Dodis, Y., Gennaro, R., Håstad, J., Krawczyk, H., Rabin, T.: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 494-510. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 494-510
-
-
Dodis, Y.1
Gennaro, R.2
Håstad, J.3
Krawczyk, H.4
Rabin, T.5
-
10
-
-
36549032633
-
Pairings for Cryptographers
-
Cryptology ePrint Archive Report 2006/165
-
Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for Cryptographers. Cryptology ePrint Archive Report 2006/165 (2006)
-
(2006)
-
-
Galbraith, S.D.1
Paterson, K.G.2
Smart, N.P.3
-
11
-
-
0022080529
-
A Randomized Protocol for Signing Contracts
-
Even, S., Goldreich, O., Lempel, A.: A Randomized Protocol for Signing Contracts. Communications of the ACM 28(6), 637-647 (1985)
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
13
-
-
0000108216
-
-
Goldreich, O., Kahan, A.: How To Construct Constant-Round Zero-Knowledge Proof Systems for NP. Journal of Cryptology 9(3), 167-190 (1996)
-
Goldreich, O., Kahan, A.: How To Construct Constant-Round Zero-Knowledge Proof Systems for NP. Journal of Cryptology 9(3), 167-190 (1996)
-
-
-
-
14
-
-
84955564077
-
Computation of General Functions in Presence of Immoral Majority
-
Menezes, A, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
-
Goldwasser, S., Levin, L.: Computation of General Functions in Presence of Immoral Majority. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 77-93. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
15
-
-
0023545076
-
-
Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In: 19th STOC, pp. 218-229 (1987) For details see [12]
-
Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In: 19th STOC, pp. 218-229 (1987) For details see [12]
-
-
-
-
16
-
-
38149091799
-
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Green, M., Hohenberger, S.: Blind Identity-Based Encryption and Simulatable Oblivious Transfer. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 265-282. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 265-282
-
-
Green, M.1
Hohenberger, S.2
-
17
-
-
24944473997
-
Smooth Projective Hashing and Two-Message Oblivious Transfer
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Kalai, Y.T.: Smooth Projective Hashing and Two-Message Oblivious Transfer. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 78-95. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 78-95
-
-
Kalai, Y.T.1
-
18
-
-
84898989941
-
Founding Cryptograph on Oblivious Transfer
-
Kilian, J.: Founding Cryptograph on Oblivious Transfer. In: 20th STOC, pp. 20-31 (1988)
-
(1988)
20th STOC
, pp. 20-31
-
-
Kilian, J.1
-
19
-
-
0031378815
-
Replication is NOT Needed: SINGLE Database, Computationally-Private Information Retrieval
-
Kushilevitz, E., Ostrovsky, R.: Replication is NOT Needed: SINGLE Database, Computationally-Private Information Retrieval. In: 38th FOCS, pp. 364-373 (1997)
-
(1997)
38th FOCS
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
20
-
-
38049136534
-
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
21
-
-
84974655726
-
Secure Computation
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Micali, S., Rogaway, P.: Secure Computation. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 392-404. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
23
-
-
64049119146
-
Efficient Oblivious Transfer Protocols
-
Naor, M., Pinkas, B.: Efficient Oblivious Transfer Protocols. In: 12th SODA, pp. 448-457 (2001)
-
(2001)
12th SODA
, pp. 448-457
-
-
Naor, M.1
Pinkas, B.2
-
24
-
-
43149090419
-
-
Rabin, M.: How to Exchange Secrets by Oblivious Transfer. Tech. Memo TR-81, Aiken Computation Laboratory, Harvard U (1981)
-
Rabin, M.: How to Exchange Secrets by Oblivious Transfer. Tech. Memo TR-81, Aiken Computation Laboratory, Harvard U (1981)
-
-
-
-
25
-
-
0022882770
-
How to Generate and Exchange Secrets
-
Yao, A.: How to Generate and Exchange Secrets. In: 27th FOCS, pp. 162-167 (1986)
-
(1986)
27th FOCS
, pp. 162-167
-
-
Yao, A.1
|