-
1
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction
-
Rudnicki, P, ed, ACM Press, New York
-
Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction. In: Rudnicki, P. (ed.) Proceedings of the eighth annual ACM Symposium on Principles of distributed computing, pp. 201-209. ACM Press, New York (1989)
-
(1989)
Proceedings of the eighth annual ACM Symposium on Principles of distributed computing
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
2
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
ACM Press, New York
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computations. In: 20th Annual ACM Symposium on Theory of Computing, pp. 1-10. ACM Press, New York (1988)
-
(1988)
20th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
ACM Press, New York
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols. In: 20th Annual ACM Symposium on Theory of Computing, pp. 11-19. ACM Press, New York (1988)
-
(1988)
20th Annual ACM Symposium on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
5
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Cramer, R., Damgård, I., Nielsen, J.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280-300. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 280-300
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.3
-
7
-
-
33745567199
-
-
Damgård, I., Fitzi, M., Kiltz, E., Nielsen, J., Toft, T.: Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 285-304. Springer, Heidelberg (2006)
-
Damgård, I., Fitzi, M., Kiltz, E., Nielsen, J., Toft, T.: Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 285-304. Springer, Heidelberg (2006)
-
-
-
-
8
-
-
84867553981
-
-
Damgård, I., Jurik, M.: A generalization, a simplification and some applications of Paillier's probabilistic public-key system. In: Kim, K.-c. (ed.) PKC 2001. LNCS, 1992, pp. 110-136. Springer, Heidelberg (2001)
-
Damgård, I., Jurik, M.: A generalization, a simplification and some applications of Paillier's probabilistic public-key system. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 110-136. Springer, Heidelberg (2001)
-
-
-
-
9
-
-
35248844164
-
Universally composable efficient multiparty computation from threshold homomorphic encryption
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Damgård, I., Nielsen, J.: Universally composable efficient multiparty computation from threshold homomorphic encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 247-264. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 247-264
-
-
Damgård, I.1
Nielsen, J.2
-
10
-
-
33748996753
-
Secure multiparty computation of approximations
-
Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M., Wright, R.: Secure multiparty computation of approximations. ACM Transactions on Algorithms 2(3), 435-472 (2006)
-
(2006)
ACM Transactions on Algorithms
, vol.2
, Issue.3
, pp. 435-472
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.3
Nissim, K.4
Strauss, M.5
Wright, R.6
-
11
-
-
70350404135
-
-
Fouque, P., Stern, J., Wackers, G.: CryptoComputing with rationals. In: Financial Cryptography 2002. LNCS. Springer, Berlin (2002)
-
Fouque, P., Stern, J., Wackers, G.: CryptoComputing with rationals. In: Financial Cryptography 2002. LNCS. Springer, Berlin (2002)
-
-
-
-
12
-
-
0023545076
-
How to play any mental game
-
ACM Press, New York
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: STOC 1987: Proceedings of the nineteenth annual ACM conference on Theory of computing, pp. 218-229. ACM Press, New York (1987)
-
(1987)
STOC 1987: Proceedings of the nineteenth annual ACM conference on Theory of computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
13
-
-
70350369347
-
Linear programming
-
October
-
Goemans, M.: Linear programming. Course notes (October 1994), http://www-math.mit.edu/~goemans/notes-lp.ps
-
(1994)
Course notes
-
-
Goemans, M.1
-
15
-
-
51249181779
-
A new polynomial-time algorithm for linear programming
-
Karmarkar, N.: A new polynomial-time algorithm for linear programming. Combinatorica 4(4), 373-395 (1984)
-
(1984)
Combinatorica
, vol.4
, Issue.4
, pp. 373-395
-
-
Karmarkar, N.1
-
16
-
-
0000564361
-
A polynomial algorithm in linear programming
-
Khachiyan, L.: A polynomial algorithm in linear programming. Soviet Mathematics Doklady 20 (1979)
-
(1979)
Soviet Mathematics Doklady
, vol.20
-
-
Khachiyan, L.1
-
18
-
-
38049034355
-
-
Nishide, T., Ohta, K.: Multiparty computation for interval, equality, and comparison without bit-decomposition protocol. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 343-360. Springer, Heidelberg (2007)
-
Nishide, T., Ohta, K.: Multiparty computation for interval, equality, and comparison without bit-decomposition protocol. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 343-360. Springer, Heidelberg (2007)
-
-
-
-
19
-
-
38449097356
-
-
Nielsen, K., Toft, T.: Secure relative performance scheme. In: Deng, X., Graham, F.C. (eds.) WINE 2007. LNCS, 4858, pp. 396-403. Springer, Heidelberg (2007)
-
Nielsen, K., Toft, T.: Secure relative performance scheme. In: Deng, X., Graham, F.C. (eds.) WINE 2007. LNCS, vol. 4858, pp. 396-403. Springer, Heidelberg (2007)
-
-
-
-
20
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
21
-
-
67650390554
-
Enumeration of all extreme equlibria of bimatrix games with integer pivoting and improved degeneracy check
-
LSE-CDAM-2005-18
-
Rosenberg, G.: Enumeration of all extreme equlibria of bimatrix games with integer pivoting and improved degeneracy check, CDAM Research Report LSE-CDAM-2005-18 (2005), http://www.cdam.lse.ac.uk/Reports/Abstracts/cdam-2005- 18.html
-
(2005)
CDAM Research Report
-
-
Rosenberg, G.1
-
22
-
-
67049151991
-
Secret sharing comparison by transformation and rotation
-
Proceedings of the International Conference on Information Theoretic Security (ICITS, Springer, Heidelberg , to appear
-
Reistad, T., Toft, T.: Secret sharing comparison by transformation and rotation. In: Proceedings of the International Conference on Information Theoretic Security (ICITS) 2007. LNCS. Springer, Heidelberg (2007) (to appear)
-
(2007)
LNCS
-
-
Reistad, T.1
Toft, T.2
-
23
-
-
84864569795
-
Secure combinatorial optimization simulating dfs tree-based variable elimination
-
Silaghi, M., Faltings, B., Petcu, A.: Secure combinatorial optimization simulating dfs tree-based variable elimination. In: AI and Math 2006 Proceedings (2006), http://anytime.cs.umass.edu/aimath06/proceedings.html
-
(2006)
AI and Math 2006 Proceedings
-
-
Silaghi, M.1
Faltings, B.2
Petcu, A.3
-
24
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
25
-
-
70350355967
-
A suite of secure multi-party computation algorithms for solving distributed constraint satisfaction and optimization problems
-
Technical Report CS-2004-04, Florida Institute of Technology
-
Silaghi, M.: A suite of secure multi-party computation algorithms for solving distributed constraint satisfaction and optimization problems. Technical Report CS-2004-04, Florida Institute of Technology (2004)
-
(2004)
-
-
Silaghi, M.1
|