-
1
-
-
38049082907
-
-
Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 137-156. Springer, Heidelberg (2007)
-
Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
-
-
-
-
2
-
-
0039324528
-
-
Springer, Berlin
-
Bürgisser, P., Clausen, M., Shokrollahi, M.A.: Algebraic complexity theory. Springer, Berlin (1997)
-
(1997)
Algebraic complexity theory
-
-
Bürgisser, P.1
Clausen, M.2
Shokrollahi, M.A.3
-
3
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computations. In: STOC, pp. 1-10 (1988)
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
84983014125
-
Fast solution of Toeplitz systems of equations and computation of pade approximants
-
Brent, R.P., Gustavson, F.G., Yun, D.Y.Y.: Fast solution of Toeplitz systems of equations and computation of pade approximants. J. Algorithms, 259-295 (1980)
-
(1980)
J. Algorithms
, pp. 259-295
-
-
Brent, R.P.1
Gustavson, F.G.2
Yun, D.Y.Y.3
-
5
-
-
0024940038
-
-
Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In: PODC, pp. 201-209. ACM Press, New York (1989)
-
Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In: PODC, pp. 201-209. ACM Press, New York (1989)
-
-
-
-
6
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols. In: STOC, pp. 11-19 (1988)
-
(1988)
STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
7
-
-
84880872502
-
Secure distributed linear algebra in a constant number of rounds
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Cramer, R., Damgaard, I.: Secure distributed linear algebra in a constant number of rounds. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 119-136. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 119-136
-
-
Cramer, R.1
Damgaard, I.2
-
8
-
-
84948975649
-
General secure multi-party computation from any linear secret-sharing scheme
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Cramer, R., Damgård, I., Maurer, U.: General secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316-334. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 316-334
-
-
Cramer, R.1
Damgård, I.2
Maurer, U.3
-
9
-
-
38049184750
-
A note on secure computation of the Moore-Penrose pseudo-inverse and its application to secure linear algebra
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Cramer, R., Kiltz, E., Padró, C.: A note on secure computation of the Moore-Penrose pseudo-inverse and its application to secure linear algebra. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, p. 613. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 613
-
-
Cramer, R.1
Kiltz, E.2
Padró, C.3
-
10
-
-
0023599876
-
-
STOC, pp, ACM Press, New York 1987
-
Coppersmith, D., Winograd, S.: Matrix multiplication via arithmetic progressions. In: STOC, pp. 1-6. ACM Press, New York (1987)
-
Matrix multiplication via arithmetic progressions
, pp. 1-6
-
-
Coppersmith, D.1
Winograd, S.2
-
11
-
-
0003046567
-
New inversion formulas for matrices classified in terms of their distance from Toeplitz matrices
-
Friedlander, B., Morf, M., Kailath, T., Ljung, L.: New inversion formulas for matrices classified in terms of their distance from Toeplitz matrices. Linear Algebra and Appl. 27, 31-60 (1979)
-
(1979)
Linear Algebra and Appl
, vol.27
, pp. 31-60
-
-
Friedlander, B.1
Morf, M.2
Kailath, T.3
Ljung, L.4
-
12
-
-
0023545076
-
How to play any mental game
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: STOC, pp. 218-229 (1987)
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
13
-
-
0001726473
-
On the inversion of finite Toeplitz matrices and their continuous analogs
-
Gohberg, I., Semencul, A.: On the inversion of finite Toeplitz matrices and their continuous analogs. Math. Issl., 201-233 (1972)
-
(1972)
Math. Issl
, pp. 201-233
-
-
Gohberg, I.1
Semencul, A.2
-
14
-
-
0003819667
-
-
Addison Wesley Longman Publishing Co, Inc, Redwood City
-
JáJá, J.: An introduction to parallel algorithms. Addison Wesley Longman Publishing Co., Inc., Redwood City (1992)
-
(1992)
An introduction to parallel algorithms
-
-
JáJá, J.1
-
15
-
-
33748109704
-
Information-theoretically secure protocols and security under composition
-
Kushilevitz, E., Lindell, Y., Rabin, T.: Information-theoretically secure protocols and security under composition. In: STOC, pp. 109-118 (2006)
-
(2006)
STOC
, pp. 109-118
-
-
Kushilevitz, E.1
Lindell, Y.2
Rabin, T.3
-
16
-
-
38049077335
-
-
Kiltz, E., Mohassel, P., Weinreb, E., Franklin, M.: Secure linear algebra using linearly recurrent sequences. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 291-310. Springer, Heidelberg (2007)
-
Kiltz, E., Mohassel, P., Weinreb, E., Franklin, M.: Secure linear algebra using linearly recurrent sequences. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 291-310. Springer, Heidelberg (2007)
-
-
-
-
17
-
-
85058940739
-
-
Kaltofen, E., Pan, V.: Processor efficient parallel solution of linear systems over an abstract field. In: SPAA, pp. 180-191. ACM Press, New York (1991)
-
Kaltofen, E., Pan, V.: Processor efficient parallel solution of linear systems over an abstract field. In: SPAA, pp. 180-191. ACM Press, New York (1991)
-
-
-
-
18
-
-
84968495217
-
-
Kaltofen, E., Saunders, D.: On Wiedemann's method of solving sparse linear systems. In: AAECC-9, London, UK, pp. 29-38 (1991)
-
Kaltofen, E., Saunders, D.: On Wiedemann's method of solving sparse linear systems. In: AAECC-9, London, UK, pp. 29-38 (1991)
-
-
-
-
19
-
-
33745567199
-
-
Damgaard, I., Fitzi, M., Kiltz, E., Nielsen, J.B., Toft, T.: Unconditionally Secure Constant-Rounds Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 285-304. Springer, Heidelberg (2006)
-
Damgaard, I., Fitzi, M., Kiltz, E., Nielsen, J.B., Toft, T.: Unconditionally Secure Constant-Rounds Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 285-304. Springer, Heidelberg (2006)
-
-
-
-
20
-
-
35048833033
-
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Lindell, Y.: Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 171-189. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 171-189
-
-
Lindell, Y.1
-
21
-
-
33745868262
-
-
Mohassel, P., Franklin, M.: Efficient Polynomial Operations in the Shared-Coefficient Setting. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, 3958, pp. 44-57. Springer, Heidelberg (2006)
-
Mohassel, P., Franklin, M.: Efficient Polynomial Operations in the Shared-Coefficient Setting. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 44-57. Springer, Heidelberg (2006)
-
-
-
-
22
-
-
33745558215
-
-
Nissim, K., Weinreb, E.: Communication efficient secure linear algebra. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 522-541. Springer, Heidelberg (2006)
-
Nissim, K., Weinreb, E.: Communication efficient secure linear algebra. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 522-541. Springer, Heidelberg (2006)
-
-
-
-
23
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Pallier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Pallier, P.1
-
24
-
-
0022583143
-
Solving sparse linear equations over finite fields
-
Wiedemann, D.H.: Solving sparse linear equations over finite fields. IEEE Trans. Inf. Theor. 32(1), 54-62 (1986)
-
(1986)
IEEE Trans. Inf. Theor
, vol.32
, Issue.1
, pp. 54-62
-
-
Wiedemann, D.H.1
-
25
-
-
0020312165
-
-
Yao,A.C.:Protocolsforsecurecomputations.In:FOCS,pp.160-164(1982)
-
Yao,A.C.:Protocolsforsecurecomputations.In:FOCS,pp.160-164(1982)
-
-
-
-
26
-
-
0022882770
-
How to generate and exchange secrets
-
Yao, A.C.: How to generate and exchange secrets. In: FOCS, pp. 162-167 (1986)
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.1
|