-
1
-
-
51849140874
-
Collusion-Free Protocols in the Mediated Model
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Alwen, J., Shelat, A., Visconti, I.: Collusion-Free Protocols in the Mediated Model. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 497-514. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 497-514
-
-
Alwen, J.1
Shelat, A.2
Visconti, I.3
-
2
-
-
33745126318
-
Secure Computation without Authentication
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Barak, B., Canetti, R., Lindell, Y., Pass, R., Rabin, T.: Secure Computation without Authentication. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 361-377. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 361-377
-
-
Barak, B.1
Canetti, R.2
Lindell, Y.3
Pass, R.4
Rabin, T.5
-
3
-
-
24944437048
-
-
Bohli, J.M., Steinwandt, R.: On Subliminal Channels in Deterministic Signature Schemes. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, 3506, pp. 182-194. Springer, Heidelberg (2005)
-
Bohli, J.M., Steinwandt, R.: On Subliminal Channels in Deterministic Signature Schemes. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 182-194. Springer, Heidelberg (2005)
-
-
-
-
4
-
-
84955564237
-
-
Burmester, M., Desmedt, Y., Itoh, T., Sakurai, K., Shizuya, H., Yung, M.: A Progress Report on Subliminal-Free Channels. In: Anderson, R. (ed.) IH 1996. LNCS, 1174, pp. 157-168. Springer, Heidelberg (1996)
-
Burmester, M., Desmedt, Y., Itoh, T., Sakurai, K., Shizuya, H., Yung, M.: A Progress Report on Subliminal-Free Channels. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 157-168. Springer, Heidelberg (1996)
-
-
-
-
5
-
-
0000731055
-
Security and Composition of Multiparty Cryptographic Protocols
-
Canetti, R.: Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
6
-
-
0034371308
-
Collusive Bidding: Lessons from the FCC Spectrum Auctions
-
Cramption, P., Schwartz, J.: Collusive Bidding: Lessons from the FCC Spectrum Auctions. Journal of Regulatory Economics 17(3), 229-252 (2000)
-
(2000)
Journal of Regulatory Economics
, vol.17
, Issue.3
, pp. 229-252
-
-
Cramption, P.1
Schwartz, J.2
-
7
-
-
0029699141
-
Simmons' Protocol is not Free of Subliminal Channels
-
Desmedt, Y.: Simmons' Protocol is not Free of Subliminal Channels. In: IEEE Computer Security Foundations Workshop, pp. 170-175 (1996)
-
(1996)
IEEE Computer Security Foundations Workshop
, pp. 170-175
-
-
Desmedt, Y.1
-
8
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press, Cambridge
-
Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
9
-
-
84937438364
-
Provably Secure Steganography
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Hopper, N., Langford, J., von Ahn, L.: Provably Secure Steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 77-92. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 77-92
-
-
Hopper, N.1
Langford, J.2
von Ahn, L.3
-
10
-
-
40249119683
-
-
Izmalkov, S., Lepinski, M., Micali, S.: Verifiably Secure Devices. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 273-301. Springer, Heidelberg (2008)
-
Izmalkov, S., Lepinski, M., Micali, S.: Verifiably Secure Devices. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 273-301. Springer, Heidelberg (2008)
-
-
-
-
11
-
-
33748582624
-
Rational Secure Computation and Ideal Mechanism Design
-
Izmalkov, S., Micali, S., Lepinski, M.: Rational Secure Computation and Ideal Mechanism Design. In: Foundations of Computer Science (FOCS) 2005, pp. 585-595 (2005)
-
(2005)
Foundations of Computer Science (FOCS)
, pp. 585-595
-
-
Izmalkov, S.1
Micali, S.2
Lepinski, M.3
-
12
-
-
24144447639
-
-
Lepinski, M., Micali, S., Shelat, A.: Fair Zero-Knowledge. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 245-263. Springer, Heidelberg (2005)
-
Lepinski, M., Micali, S., Shelat, A.: Fair Zero-Knowledge. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 245-263. Springer, Heidelberg (2005)
-
-
-
-
13
-
-
33748680791
-
Collusion-Free Protocols
-
ACM, New York
-
Lepinski, M., Micali, S., Shelat, A.: Collusion-Free Protocols. In: Symposium on Theory of Computing (STOC) 2005, pp. 543-552. ACM, New York (2005)
-
(2005)
Symposium on Theory of Computing (STOC)
, pp. 543-552
-
-
Lepinski, M.1
Micali, S.2
Shelat, A.3
-
14
-
-
70350273677
-
Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model
-
Lindell, Y.: Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model. Chicago Journal of Theoretical Computer Science (1), 1-50 (2006)
-
(2006)
Chicago Journal of Theoretical Computer Science
, vol.1
, pp. 1-50
-
-
Lindell, Y.1
-
15
-
-
43249123514
-
Lower Bounds and Impossibility Results for Concurrent Self Composition
-
Lindell, Y.: Lower Bounds and Impossibility Results for Concurrent Self Composition. Journal of Cryptology 21(2), 200-249 (2008)
-
(2008)
Journal of Cryptology
, vol.21
, Issue.2
, pp. 200-249
-
-
Lindell, Y.1
-
16
-
-
4544250511
-
Bounded-Concurrent Secure Multi-Party Computation with a Dishonest Majority
-
STOC
-
Pass, R.: Bounded-Concurrent Secure Multi-Party Computation with a Dishonest Majority. In: Symposium on Theory of Computing (STOC) 2004, pp. 232-241 (2004)
-
(2004)
Symposium on Theory of Computing
, pp. 232-241
-
-
Pass, R.1
-
17
-
-
0001217738
-
The Prisoners' Problem and the Subliminal Channel
-
Springer, Heidelberg
-
Simmons, G.: The Prisoners' Problem and the Subliminal Channel. In: Advances in Cryptology-Crypto 1983, pp. 51-67. Springer, Heidelberg (1983)
-
(1983)
Advances in Cryptology-Crypto
, pp. 51-67
-
-
Simmons, G.1
-
18
-
-
0028532997
-
Cryptanalysis and Protocol Failures
-
Simmons, G.: Cryptanalysis and Protocol Failures. Comm. ACM 37(11), 56-65 (1994)
-
(1994)
Comm. ACM
, vol.37
, Issue.11
, pp. 56-65
-
-
Simmons, G.1
-
19
-
-
84955557536
-
The History of Subliminal Channels
-
Simmons, G.: The History of Subliminal Channels. In: Information Hiding Workshop, pp. 237-256 (1996)
-
(1996)
Information Hiding Workshop
, pp. 237-256
-
-
Simmons, G.1
|