-
2
-
-
0023545076
-
How to play any mental game
-
ACM Press, New York
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC 1987), pp. 218-229. ACM Press, New York (1987)
-
(1987)
Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
3
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
ACM Press, New York
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC 1988), pp. 1-10. ACM Press, New York (1988)
-
(1988)
Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
84898947315
-
Multiparty unconditionally secure protocols (extended abstract)
-
ACM Press, New York
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC 1988), pp. 11-19. ACM Press, New York (1988)
-
(1988)
Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
5
-
-
0001998264
-
Conjugate coding
-
Wiesner, S.: Conjugate coding. SIGACT News 15(1), 78-88 (1983)
-
(1983)
SIGACT News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
-
6
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Technical Report TR-81, Harvard Aiken Computation Laboratory
-
Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory (1981)
-
(1981)
-
-
Rabin, M.O.1
-
7
-
-
0022080529
-
A randomized protocol for signing contracts
-
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
8
-
-
85032194875
-
How to solve any protocol problem - an efficiency improvement
-
Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
-
Goldreich, O., Vainish, R.: How to solve any protocol problem - an efficiency improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 73-86. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
10
-
-
85032868401
-
Verifiable disclosure of secrets and applications
-
Quisquater, J.-J, Vandewalle, J, eds, EUROCRYPT 1989, Springer, Heidelberg
-
Crépeau, C.: Verifiable disclosure of secrets and applications. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 181-191. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.434
, pp. 181-191
-
-
Crépeau, C.1
-
11
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Menezes, A, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
-
Goldwasser, S., Levin, L.A.: Fair computation of general functions in presence of immoral majority. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 77-93. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.A.2
-
12
-
-
84957649042
-
Committed oblivious transfer and private multi-party computation
-
Coppersmith, D, ed, CRYPTO 1995, Springer, Heidelberg
-
Crépeau, C., van de Graaf, J., Tapp, A.: Committed oblivious transfer and private multi-party computation. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 110-123. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 110-123
-
-
Crépeau, C.1
van de Graaf, J.2
Tapp, A.3
-
14
-
-
84974655726
-
Secure computation (abstract)
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Micali, S., Rogaway, P.: Secure computation (abstract). In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 392-404. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
15
-
-
85029542707
-
Foundations of secure interactive computing
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Beaver, D.: Foundations of secure interactive computing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 377-391. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 377-391
-
-
Beaver, D.1
-
16
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186-208 (1989)
-
(1989)
SIAM J. Comput
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
17
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
18
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press, Cambridge
-
Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. II. Cambridge University Press, Cambridge (2004)
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
21
-
-
33746082048
-
Information-theoretic conditions for two-party secure function evaluation
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Crépeau, C., Savvides, G., Schaffner, C., Wullschleger, J.: Information-theoretic conditions for two-party secure function evaluation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 538-554. Springer, Heidelberg (2006), http://eprint.iacr.org/2006/183
-
(2006)
LNCS
, vol.4004
, pp. 538-554
-
-
Crépeau, C.1
Savvides, G.2
Schaffner, C.3
Wullschleger, J.4
-
23
-
-
84856043672
-
A mathematical theory of communication
-
Shannon, C.E.: A mathematical theory of communication. Bell System Tech. Journal 27, 379-423 (1948)
-
(1948)
Bell System Tech. Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
26
-
-
0016993685
-
A constructive proof of the brouwer fixed-point theorem and computational results
-
Kellogg, R.B., Li, T.Y., Yorke, J.: A constructive proof of the brouwer fixed-point theorem and computational results. SIAM Journal on Numerical Analysis 13(4), 473-483 (1976)
-
(1976)
SIAM Journal on Numerical Analysis
, vol.13
, Issue.4
, pp. 473-483
-
-
Kellogg, R.B.1
Li, T.Y.2
Yorke, J.3
|