-
3
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation (extended abstract)
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation (extended abstract). In: Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pp. 1-10 (1988)
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
0032313750
-
Oblivious transfer with a memory bounded receiver
-
Cachin, C., Crépeau, C., Marcil, S.: Oblivious transfer with a memory bounded receiver. In: Proceedings of IEEE Symposium on Foundations of Computer Science, pp. 493-502 (1998)
-
(1998)
Proceedings of IEEE Symposium on Foundations of Computer Science
, pp. 493-502
-
-
Cachin, C.1
Crépeau, C.2
Marcil, S.3
-
5
-
-
84958598231
-
Unconditional security against memory-bounded adversaries
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Cachin, C., Maurer, U.: Unconditional security against memory-bounded adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 292-306. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 292-306
-
-
Cachin, C.1
Maurer, U.2
-
6
-
-
84898947315
-
Multiparty unconditionally secure protocols (extended abstract)
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pp. 11-19 (1988)
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
7
-
-
85032862578
-
Controlled gradual disclosure schemes for random bits and their applications
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Cleve, R.: Controlled gradual disclosure schemes for random bits and their applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 573-588. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 573-588
-
-
Cleve, R.1
-
8
-
-
84957717648
-
Efficient multiparty computations with dishonest majority
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Cramer, R., Damgaard, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient multiparty computations with dishonest majority. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 311-326. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 311-326
-
-
Cramer, R.1
Damgaard, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
9
-
-
84948975649
-
Efficient general secure multi-party computation from any linear secret-sharing scheme
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Cramer, R., Damgård, I., Maurer, U.: Efficient general secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316-334. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 316-334
-
-
Cramer, R.1
Damgård, I.2
Maurer, U.3
-
10
-
-
0031622922
-
Universal service-providers for database private information retrieval
-
Crescenzo, G.D., Ishai, Y., Ostrovsky, R.: Universal service-providers for database private information retrieval. In: Proceedings of the 17th Annual ACM Symposium on Principles of Distributed Computing, pp. 91-100 (1998)
-
(1998)
Proceedings of the 17th Annual ACM Symposium on Principles of Distributed Computing
, pp. 91-100
-
-
Crescenzo, G.D.1
Ishai, Y.2
Ostrovsky, R.3
-
11
-
-
84957356475
-
Efficient cryptographic protocols based on noisy channels
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Crépeau, C.: Efficient cryptographic protocols based on noisy channels. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 306-317. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 306-317
-
-
Crépeau, C.1
-
13
-
-
84957649042
-
Committed oblivious transfer and private multiparty computation
-
Coppersmith, D, ed, CRYPTO 1995, Springer, Heidelberg
-
Crépeau, C., Graaf, J., Tapp, A.: Committed oblivious transfer and private multiparty computation. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 110-123. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 110-123
-
-
Crépeau, C.1
Graaf, J.2
Tapp, A.3
-
15
-
-
23944515855
-
Efficient unconditional oblivious transfer from almost any noisy channel
-
Crépeau, C., Morozov, K., Wolf, S.: Efficient unconditional oblivious transfer from almost any noisy channel. In: Proceedings of Fourth Conference on Security in Communication Networks, pp. 47-59 (2004)
-
(2004)
Proceedings of Fourth Conference on Security in Communication Networks
, pp. 47-59
-
-
Crépeau, C.1
Morozov, K.2
Wolf, S.3
-
16
-
-
2942529194
-
Privacy-preserving multivariate statistical analysis: Linear regression and classification
-
Du, W., Han, Y.S., Chen, S.: Privacy-preserving multivariate statistical analysis: Linear regression and classification. In: Proceedings of the 4th SIAM International Conference on Data Mining, pp. 222-233 (2004)
-
(2004)
Proceedings of the 4th SIAM International Conference on Data Mining
, pp. 222-233
-
-
Du, W.1
Han, Y.S.2
Chen, S.3
-
18
-
-
0023545076
-
How to play any mental game
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp. 218-229 (1987)
-
(1987)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
21
-
-
54249101874
-
-
Nascimento, A.C.A., Müller-Quade, J., Otsuka, A., Hanaoka, G., Imai, H.: Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, 3089, Springer, Heidelberg (2004)
-
Nascimento, A.C.A., Müller-Quade, J., Otsuka, A., Hanaoka, G., Imai, H.: Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, Springer, Heidelberg (2004)
-
-
-
|