-
1
-
-
35048875418
-
Secure Computation of the K'thranked Element
-
EUROCRYPT 2004, Springer-Verlag
-
G. Aggarwal, N. Mishra and B. Pinkas. Secure Computation of the K'thranked Element. In EUROCRYPT 2004, Springer-Verlag (LNCS 3027), pages 40-55, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 40-55
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
2
-
-
38049082907
-
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
-
4th TCC, Springer-Verlag
-
Y. Aumann and Y. Lindell. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In 4th TCC, Springer-Verlag (LNCS 4392), pages 137-156, 2007.
-
(2007)
LNCS
, vol.4392
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
3
-
-
85029542707
-
Foundations of Secure Interactive Computing
-
CRYPTO'91, Springer-Verlag
-
D. Beaver. Foundations of Secure Interactive Computing. In CRYPTO'91, Springer-Verlag (LNCS 576), pages 377-391, 1991.
-
(1991)
LNCS
, vol.576
, pp. 377-391
-
-
Beaver, D.1
-
4
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
M. Ben-Or, S. Goldwasser and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In 20th STOC, pages 1-10, 1988.
-
(1988)
20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
0000731055
-
Security and Composition of Multiparty Cryptographic Protocols
-
R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology, 13(l):143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.L
, pp. 143-202
-
-
Canetti, R.1
-
6
-
-
0034782679
-
Selective Private Function Evaluation with Applications to Private Statistics
-
R. Canetti, Y. Ishai, R. Kumar, M.K. Reiter, R. Rubinfeld and R. Wright. Selective Private Function Evaluation with Applications to Private Statistics. In 2Mh PODC, pages 293-304, 2001.
-
(2001)
2Mh PODC
, pp. 293-304
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.K.4
Rubinfeld, R.5
Wright, R.6
-
7
-
-
84898947315
-
Multi-party Unconditionally Secure Protocols
-
D. Chaum, C. Crepeau and I. Damgard. Multi-party Unconditionally Secure Protocols. In 20th STOC, pages 11-19, 1988.
-
(1988)
20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
8
-
-
0003701129
-
Private Information Retrieval by Keywords
-
Technical Report TR-CS0917, Department of Computer Science, Technion
-
B. Chor, N. Gilboa, and M. Naor. Private Information Retrieval by Keywords. Technical Report TR-CS0917, Department of Computer Science, Technion, 1997.
-
(1997)
-
-
Chor, B.1
Gilboa, N.2
Naor, M.3
-
9
-
-
0032201622
-
Private Information Retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz and M. Sudan. Private Information Retrieval. Journal of the ACM, 45(6):965-981, 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
10
-
-
24144488603
-
Keyword Search and Oblivious Pseudorandom Functions
-
TCC 2005, Springer-Verlag
-
M.J. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword Search and Oblivious Pseudorandom Functions. In TCC 2005, Springer-Verlag (LNCS 3378), pages 303-324, 2005.
-
(2005)
LNCS
, vol.3378
, pp. 303-324
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
11
-
-
35048820609
-
Efficient Private Matching and Set Intersection
-
EUROCRYPT 2004, Springer-Verlag
-
M.J. Freedman, K. Nissim and B. Pinkas. Efficient Private Matching and Set Intersection. In EUROCRYPT 2004, Springer-Verlag (LNCS 3027), pages 1-19, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
12
-
-
70349270212
-
-
O. Goldreich. Foundations of Cryptography: 1 - Basic Tools. Cambridge University Press, 2001.
-
O. Goldreich. Foundations of Cryptography: Vol. 1 - Basic Tools. Cambridge University Press, 2001.
-
-
-
-
14
-
-
0023545076
-
How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority
-
O. Goldreich, S. Micali and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987.
-
(1987)
19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
15
-
-
84955564077
-
Fair Computation of General Functions in Presence of Immoral Majority
-
CRYPTO'90, Springer-Verlag
-
S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In CRYPTO'90, Springer-Verlag (LNCS 537), pages 77-93, 1990.
-
(1990)
LNCS
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
16
-
-
40249108370
-
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
-
Springer-Verlag
-
C. Hazay and Y. Lindell, Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In 5th TCC, Springer-Verlag , pages 155-175, 2008.
-
(2008)
5th TCC
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
17
-
-
33745160750
-
Privacy-Preserving Set Operations
-
CRYPTO 2005, Springer-Verlag
-
L. Kissner and D.X. Song. Privacy-Preserving Set Operations. In CRYPTO 2005, Springer-Verlag (LNCS 3621), pages 241-257, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.X.2
-
18
-
-
33748109704
-
Information-Theoretically Secure Protocols and Security Under Composition
-
E. Kushilevitz, Y. Lindell and T. Rabin. Information-Theoretically Secure Protocols and Security Under Composition. In 38th STOC. pages 109-18, 2006.
-
(2006)
38th STOC
, pp. 109-118
-
-
Kushilevitz, E.1
Lindell, Y.2
Rabin, T.3
-
19
-
-
33746437508
-
-
Y. Lindell and B. Pinkas. Privacy Preserving Data Mining. Journal of Cryptology, 15(3): 177-206, 2002. An extended abstract appeared in CRYPTO 2000.
-
Y. Lindell and B. Pinkas. Privacy Preserving Data Mining. Journal of Cryptology, 15(3): 177-206, 2002. An extended abstract appeared in CRYPTO 2000.
-
-
-
-
20
-
-
84974655726
-
-
S. Micali and P. Rogaway. Secure Computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO'91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
-
S. Micali and P. Rogaway. Secure Computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO'91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
-
-
-
-
21
-
-
0032669864
-
Oblivious Transfer and Polynomial Evaluation. In 31si
-
M. Naor and B. Pinkas. Oblivious Transfer and Polynomial Evaluation. In 31si STOC, pages 245-254, 1999.
-
(1999)
STOC
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
22
-
-
1942521604
-
Advances in Smartcard Security
-
July
-
M. Witteman. Advances in Smartcard Security. Information Security Bulletin, July 2002, pages 11-22, 2002.
-
(2002)
Information Security Bulletin
, pp. 11-22
-
-
Witteman, M.1
-
23
-
-
0022882770
-
How to Generate and Exchange Secrets
-
A. Yao. How to Generate and Exchange Secrets. In 27th FOCS, pages 162-167, 1986.
-
(1986)
27th FOCS
, pp. 162-167
-
-
Yao, A.1
|