-
1
-
-
0040198183
-
Balanced allocations
-
Azar, Y., Broder, A. Z., Karlin, A. R., and Upfal, E. Balanced allocations. SIAM Journal on Computing 29, 1 (1999), 180-200.
-
(1999)
SIAM Journal on Computing
, vol.29
, Issue.1
, pp. 180-200
-
-
Azar, Y.1
Broder, A.Z.2
Karlin, A.R.3
Upfal, E.4
-
2
-
-
0027726717
-
-
Bellare, M., and Rogaway, P. Random oracles are practical: A paradigm for designing efficient protocols. In CCS (1993), ACM Press, pp. 62-73.
-
Bellare, M., and Rogaway, P. Random oracles are practical: A paradigm for designing efficient protocols. In CCS (1993), ACM Press, pp. 62-73.
-
-
-
-
3
-
-
24144433396
-
-
Boneh, D., Goh, E.-J., and Nissim, K. Evaluating 2-DNF formulas on ciphertexts. In TCC (2005), J. Kilian, Ed., 3378 of LNCS, pp. 325-341.
-
Boneh, D., Goh, E.-J., and Nissim, K. Evaluating 2-DNF formulas on ciphertexts. In TCC (2005), J. Kilian, Ed., vol. 3378 of LNCS, pp. 325-341.
-
-
-
-
4
-
-
84957610863
-
Proving in zero-knowledge that a number is the product of two safe primes
-
EUROCRYPT'99 , J. Stern, Ed, of
-
Camenisch, J., and Michels, M. Proving in zero-knowledge that a number is the product of two safe primes. In EUROCRYPT'99 (1999), J. Stern, Ed., vol. 1592 of LNCS, pp. 107-122.
-
(1999)
LNCS
, vol.1592
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
5
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
CRYPTO '03, of
-
Camenisch, J., and Shoup, V. Practical verifiable encryption and decryption of discrete logarithms. In CRYPTO '03 (2003), vol. 2729 of LNCS, pp. 126-144.
-
(2003)
LNCS
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
6
-
-
84880897758
-
Universally composable commitments
-
CRYPTO '01 , J. Kilian, Ed, of
-
Canetti, R., and Fischlin, M. Universally composable commitments. In CRYPTO '01 (2001), J. Kilian, Ed., vol. 2139 of LNCS, pp. 19-40.
-
(2001)
LNCS
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
7
-
-
4243180376
-
The random oracle methodology, revisited
-
July
-
Canetti, R., Goldreich, O., and Halevi, S. The random oracle methodology, revisited. Journal of the ACM 51, 4 (July 2004), 557-594.
-
(2004)
Journal of the ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
8
-
-
0036038991
-
-
Canetti, R., Lindell, Y., Ostrovsky, R., and Sahai, A. Universally composable two-party and multi-party secure computation. In STOC (2002), J. H. Reif, Ed., ACM Press, pp. 495-503.
-
Canetti, R., Lindell, Y., Ostrovsky, R., and Sahai, A. Universally composable two-party and multi-party secure computation. In STOC (2002), J. H. Reif, Ed., ACM Press, pp. 495-503.
-
-
-
-
9
-
-
84957375076
-
A secure and optimally efficient multi- authority election scheme
-
EUROCRYPT '97 , W. Fumy, Ed, of
-
Cramer, R., Gennaro, R., and Schoenmakers, B. A secure and optimally efficient multi- authority election scheme. In EUROCRYPT '97 (1997), W. Fumy, Ed., vol. 1233 of LNCS, pp. 103-118.
-
(1997)
LNCS
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
10
-
-
84937437506
-
Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor
-
CRYPTO '02 , M. Yung, Ed, of
-
Damgård, I., and Nielsen, J. B. Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. In CRYPTO '02 (2002), M. Yung, Ed., vol. 2442 of LNCS, pp. 581-596.
-
(2002)
LNCS
, vol.2442
, pp. 581-596
-
-
Damgård, I.1
Nielsen, J.B.2
-
11
-
-
35048820609
-
Efficient private matching and set intersection
-
EUROCRYPT '04, of
-
Freedman, M. J., Nissim, K., and Pinkas, B. Efficient private matching and set intersection. In EUROCRYPT '04 (2004), vol. 3027 of LNCS, pp. 1-19.
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
12
-
-
0023545076
-
How to play any mental game
-
January, ACM Press, pp
-
Goldreich, O., Micali, S., and Wigderson, A. How to play any mental game. In STOC (January 1987), ACM Press, pp. 218-229.
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
13
-
-
33746072569
-
Perfect non-interactive zero knowledge for NP
-
Groth, J., Ostrovsky, R., and Sahai, A. Perfect non-interactive zero knowledge for NP. In EUROCRYPT '06 (2006), vol. 4004, pp. 339-358.
-
(2006)
EUROCRYPT '06
, vol.4004
, pp. 339-358
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
14
-
-
26444553355
-
Testing disjointness of private datasets
-
Financial Cryptography, of
-
Kiayias, A., and Mitrofanova, A. Testing disjointness of private datasets. In Financial Cryptography (2005), vol. 3570 of LNCS, pp. 109-124.
-
(2005)
LNCS
, vol.3570
, pp. 109-124
-
-
Kiayias, A.1
Mitrofanova, A.2
-
15
-
-
33745160750
-
Privacy-preserving set operations
-
CRYPTO '05 , V. Shoup, Ed, of
-
Kissner, L., and Song, D. Privacy-preserving set operations. In CRYPTO '05 (2005), V. Shoup, Ed., vol. 3621 of LNCS, pp. 241-257.
-
(2005)
LNCS
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
16
-
-
0344118901
-
Zero-knowledge sets
-
M. Sudan, Ed, IEEE Press, pp
-
Micali, S., Rabin, M., and Kilian, J. Zero-knowledge sets. In Foundations of Computer Science - FOCS (2003), M. Sudan, Ed., IEEE Press, pp. 80-91.
-
(2003)
Foundations of Computer Science - FOCS
, pp. 80-91
-
-
Micali, S.1
Rabin, M.2
Kilian, J.3
-
17
-
-
0032669864
-
-
Naor, M., and Pinkas, B. Oblivious transfer and polynomial evaluation. In STOC (May 1999), T. Leighton, Ed., ACM Press, pp. 245-254.
-
Naor, M., and Pinkas, B. Oblivious transfer and polynomial evaluation. In STOC (May 1999), T. Leighton, Ed., ACM Press, pp. 245-254.
-
-
-
-
18
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
EUROCRYPT '99, of
-
Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT '99 (1999), vol. 1592 of LNCS, pp. 223-238.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
19
-
-
84937439454
-
Trapdooring discrete logarithms on elliptic curves over rings
-
ASIACRYPT '00 , T. Okamoto, Ed, of
-
Paillier, P. Trapdooring discrete logarithms on elliptic curves over rings. In ASIACRYPT '00 (2000), T. Okamoto, Ed., vol. 1976 of LNCS, pp. 573-584.
-
(2000)
LNCS
, vol.1976
, pp. 573-584
-
-
Paillier, P.1
-
20
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
CRYPTO '91, of
-
Pedersen, T. P. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO '91 (1991), vol. 576 of LNCS, pp. 129-140.
-
(1991)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
21
-
-
84958777058
-
Private information retrieval based on the private information retrieval based on subgroup membership problem
-
Australasian Conf. on Info. Security and Privacy, of
-
Yamamura, A., and Saito, T. Private information retrieval based on the private information retrieval based on subgroup membership problem. In Australasian Conf. on Info. Security and Privacy (2001), vol. 2119 of LNCS, pp. 206-220.
-
(2001)
LNCS
, vol.2119
, pp. 206-220
-
-
Yamamura, A.1
Saito, T.2
-
22
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE Press, pp
-
Yao, A. C. How to generate and exchange secrets. In Foundations of Computer Science - FOCS (1986), IEEE Press, pp. 162-167.
-
(1986)
Foundations of Computer Science - FOCS
, pp. 162-167
-
-
Yao, A.C.1
|