-
2
-
-
1142270257
-
A method for fast revocation of public key certificates and security capabilities
-
D. Boneh, X. Ding, G. Tsudik, and M. Wong, "A method for fast revocation of public key certificates and security capabilities," Proceedings of the 10th USENIX Security Symposium, pp. 297-308.
-
Proceedings of the 10th USENIX Security Symposium
, pp. 297-308
-
-
Boneh, D.1
Ding, X.2
Tsudik, G.3
Wong, M.4
-
3
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
C. Cachin, S. Micali, and M. Stadler, "Computa-tionally private information retrieval with polylogarithmic communication," Advances in Cryptography - Eurocrypt "99, pp. 402-414, 1999.
-
(1999)
Advances in Cryptography - Eurocrypt '99
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
5
-
-
0029723583
-
Adaptively secure multi-party computation
-
R. Canetti, U. Feige, O. Goldreich, and M. Naor, "Adaptively secure multi-party computation," Proc-cedings 28th Annual ACM Symposium on Theory of Computing (STOC), pp. 639-648, 1996.
-
(1996)
Proc-cedings 28th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
6
-
-
84958626761
-
Deniable encryption
-
Springer-Verlag, London
-
R. Canetti, C. Dwork, M. Naor, and R. Ostro-vsky, "Deniable encryption," Proceedings of the 17th Annual international Cryptology Conference on Ad-vances in Cryptology, pp. 90-104, Springer-Verlag, London, 1997.
-
(1997)
Proceedings of the 17th Annual international Cryptology Conference on Ad-vances in Cryptology
, pp. 90-104
-
-
Canetti, R.1
Dwork, C.2
Naor, M.3
Ostro-vsky, R.4
-
7
-
-
0032201622
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sus-dan, "Private information retrieval," Journal of the ACM, vol. 45, no. 6, pp. 965-982, 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-982
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sus-dan, M.4
-
8
-
-
0011901494
-
A secure and optimally efficient multi-authority elec-tion scheme
-
R. Cramer, R. Gennaro, and B. Schoenmakers, "A secure and optimally efficient multi-authority elec-tion scheme," Eurocrypt '97, pp. 103-118, 1997.
-
(1997)
Eurocrypt '97
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
9
-
-
0031624875
-
Protecting data privacy in information retrieval schemes
-
Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin, "Protecting data privacy in information retrieval schemes," Proceedings of 30th Annual ACM Sympo-sium on Theory of Computing, pp. 151-160, 1998.
-
(1998)
Proceedings of 30th Annual ACM Sympo-sium on Theory of Computing
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
10
-
-
0021409284
-
Probabilistic encryp-tion
-
S. Goldwasser, and S. Micali, "Probabilistic encryp-tion," Journal of Computer and System Sciences, vol. 28, no. 2, pp. 270-299, 1984.
-
(1984)
Journal of Computer and System Sciences
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
11
-
-
84948969982
-
Efficient receipt-free voting based on homomorphic encryption
-
M. Hirt, and K. Sako, "Efficient receipt-free voting based on homomorphic encryption," Eurocrypt '00, pp. 539-556, 2000.
-
(2000)
Eurocrypt '00
, pp. 539-556
-
-
Hirt, M.1
Sako, K.2
-
12
-
-
84875333401
-
-
(http://www.rsa.com/rsalabs)
-
-
-
-
13
-
-
79957931151
-
Eliminating quadratic slowdown in two-prime RSA function sharing
-
M. H. Ibrahim, "Eliminating quadratic slowdown in two-prime RSA function sharing," International Journal of Network Security (IJNS), vol. 7, no. 1, pp. 107-114, 2008.
-
(2008)
International Journal of Network Security (IJNS)
, vol.7
, Issue.1
, pp. 107-114
-
-
Ibrahim, M.H.1
-
15
-
-
35048835796
-
A new paradigm of hybrid encryption scheme
-
LNCS Matthew Franklin, Editor
-
K. Kurosawa, and Y. Desmedt, "A new paradigm of hybrid encryption scheme," Advances in Cryptol-ogy - Crypto '04, LNCS 3152, pp. 426-442, Matthew Franklin, Editor, 2004.
-
(2004)
Advances in Cryptol-ogy - Crypto '04
, vol.3152
, pp. 426-442
-
-
Kurosawa, K.1
Desmedt, Y.2
-
19
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. B. Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," Proceedings of the 20th ACM Symposium on the Theory of Computing, pp. 1-10, 1988.
-
(1988)
Proceedings of the 20th ACM Symposium on the Theory of Computing
, pp. 1-10
-
-
Or, M.B.1
Goldwasser, S.2
Wigderson, A.3
-
21
-
-
84947772655
-
A new and efficient all-or-nothing disclo-sure of secrets protocol
-
Springer-Verlag
-
J. Stern, "A new and efficient all-or-nothing disclo-sure of secrets protocol," Asiacrypt '98, pp. 357-371, Springer-Verlag, 1998.
-
(1998)
Asiacrypt '98
, pp. 357-371
-
-
Stern, J.1
|