-
1
-
-
35048846561
-
Strong conditional oblivious transfer and computing on intervals
-
Blake, I.F. and Kolesnikov, V. (2004) 'Strong conditional oblivious transfer and computing on intervals', in P.J. Lee, (Ed). ASIACRYPT'04, Volume 3329 of Lecture Notes in Computer Science, Springer, pp. 515-529. (Pubitemid 39747776)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3329
, pp. 515-529
-
-
Blake, I.F.1
Kolesnikov, V.2
-
2
-
-
33750037945
-
Conditional encrypted mapping and comparing encrypted numbers
-
G. Di Crescenzo and A. Rubin, (Eds) Springer
-
Blake, I.F. and Kolesnikov, V. (2006) 'Conditional encrypted mapping and comparing encrypted numbers', in G. Di Crescenzo and A. Rubin, (Eds). FC 06, Volume 4107 of Lecture Notes in Computer Science, Springer.
-
(2006)
FC 06, Lecture Notes in Computer Science
, vol.4107
-
-
Blake, I.F.1
Kolesnikov, V.2
-
3
-
-
84957366640
-
Rapid demonstration of linear relations connected by boolean operators
-
J. Stern (Ed) Springer
-
Brand, S. (1997) 'Rapid demonstration of linear relations connected by boolean operators', in J. Stern (Ed). EUROCRYPT'97, Volume 1233 of Lecture Notes in Computer Science, Springer, pp. 318-333.
-
(1997)
EUROCRYPT'97, Lecture Notes in Computer Science
, vol.1233
, pp. 318-333
-
-
Brand, S.1
-
4
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R. (2000) 'Security and composition of multiparty cryptographic protocols', Journal of Cryptology, Vol. 13, No. 1, pp. 143-202.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
5
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
B. Pfitzmann (Ed) Springer
-
Cramer, R., Damgård, I. and Nielsen, J.B. (2001) 'Multiparty computation from threshold homomorphic encryption', in B. Pfitzmann (Ed).EUROCRYPT'01,Volume 2045 of Lecture Notes in Computer Science, Springer, pp. 280-299.
-
(2001)
EUROCRYPT'01, Lecture Notes in Computer Science
, vol.2045
, pp. 280-299
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
6
-
-
84858843037
-
-
eBay Inc. (2006) 'Bid increments', Available at: http: //pages.ebay.com/help/buy/bid-increments.html
-
(2006)
Bid Increments
-
-
-
7
-
-
84937542853
-
A cost-effective pay-per-multiplication comparison method for millionaires
-
D. Naccache (Ed), Springer
-
Fischlin, M. (2001) 'A cost-effective pay-per-multiplication comparison method for millionaires', in D. Naccache (Ed). CT-RSA'01, Volume 2020 of Lecture Notes in Computer Science, Springer, pp. 457-472.
-
(2001)
CT-RSA'01 Lecture Notes in Computer Science
, vol.2020
, pp. 457-472
-
-
Fischlin, M.1
-
8
-
-
84958615646
-
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
-
Advances in Cryptology - CRYPTO '97
-
Fujisaki, E. and Okamoto, T. (1997) 'Statistical zero knowledge protocols to prove modular polynomial relations', in B.S.K. Jr. (Ed). CRYPTO'97,volume 1294 of Lecture Notes in Computer Science,Springer, pp. 16-30. (Pubitemid 127112542)
-
(1997)
Lecture Notes in Computer Science
, Issue.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
9
-
-
38049064946
-
Practical and secure solutions for integer comparison
-
T. Okamoto and X. Wang (Ed), Springer
-
Garay, J., Schoenmakers, B. and Villegas, J. (2007) 'Practical and secure solutions for integer comparison', in T. Okamoto and X. Wang (Ed). PKC'03, Volume 4450 of Lecture Notes in Computer Science, Springer, pp. 330-342.
-
(2007)
PKC'03 Lecture Notes in Computer Science
, vol.4450
, pp. 330-342
-
-
Garay, J.1
Schoenmakers, B.2
Villegas, J.3
-
11
-
-
24144473401
-
Cryptography in subgroups of Zn
-
Groth J. Kilian (Ed) Springer
-
Groth (2005) 'Cryptography in subgroups of Zn', in J. Kilian (Ed). TCC'05, Volume 3378 of Lecture Notes in Computer Science, Springer, pp. 50-65.
-
(2005)
TCC'05, Lecture Notes in Computer Science
, vol.3378
, pp. 50-65
-
-
-
12
-
-
84883898504
-
Privacy preserving auctions and mechanism design
-
New York: ACM Press
-
Naor, M., Pinkas, B. and Sumner, R. (1999) 'Privacy preserving auctions and mechanism design', EC'99, New York: ACM Press, pp. 129-139.
-
(1999)
EC'99
, pp. 129-139
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
13
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
J. Stern (Ed) Springer
-
Paillier, P. (1999) 'Public-key cryptosystems based on composite degree residuosity classes', in J. Stern (Ed). EUROCRYPT'99, volume 1592 of Lecture Notes in Computer Science, Springer, pp. 223-238.
-
(1999)
EUROCRYPT'99, Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
14
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
Pohlig, S.C. and Hellman, M.E. (1978) 'An improved algorithm for computing logarithms over GF(p) and its cryptographic significance', IEEE Transactions on Information Theory, Vol. 24, pp. 106-110.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
15
-
-
84858803486
-
Debat: Reglerne er strammet op
-
Rode, M. (2004) 'Debat: reglerne er strammet op', Morgenavisen Jyllands-Posten, Available at: http://www.jp.dk/morgenavisen/ mmeninger:aid=2690052/.
-
(2004)
Morgenavisen Jyllands-Posten
-
-
Rode, M.1
-
16
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C-P. (1991) 'Efficient signature generation by smart cards', Journal of Cryptology, Vol. 4, No. 3, pp. 161-174.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.-P.1
|