-
2
-
-
0002337124
-
How to Play Any Mental Game
-
STOC, pp
-
O. Goldreich, S. Micali, and A. Wigderson, How to Play Any Mental Game, in proceedings of the 19th Annual Symposium on Theory of Computing (STOC), pp. 218229, 1987.
-
(1987)
proceedings of the 19th Annual Symposium on Theory of Computing
, pp. 218229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
3
-
-
38049034355
-
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
-
T. Nishide and K. Ohta, Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol, in proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography (PKC), pp. 343-360, 2007.
-
(2007)
proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography (PKC)
, pp. 343-360
-
-
Nishide, T.1
Ohta, K.2
-
4
-
-
0242496951
-
Secure Multi-party Computation Problems and their Applications: A Review and Open Problems
-
W. Du and M. J. Atallah, Secure Multi-party Computation Problems and their Applications: A Review and Open Problems, in proceedings of the New Security Paradigms Workshop (NSPW), pp. 12-21, 2001.
-
(2001)
proceedings of the New Security Paradigms Workshop (NSPW)
, pp. 12-21
-
-
Du, W.1
Atallah, M.J.2
-
5
-
-
51849143985
-
-
Cryptology ePrint Archive, Report 2008/068
-
P. Bogetoft, D. L. Christensen, I. Dmgard, M. Geisler, T. Jakobsen, M. Krigaard, J. D. Nielsen, J. B. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach, and T. Toft, Multiparty Computation Goes Live, Cryptology ePrint Archive, Report 2008/068, 2008.
-
(2008)
Multiparty Computation Goes Live
-
-
Bogetoft, P.1
Christensen, D.L.2
Dmgard, I.3
Geisler, M.4
Jakobsen, T.5
Krigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.11
Toft, T.12
-
6
-
-
24144477856
-
Secure Computation of the Mean and Related Statistics
-
proceedings of the 2nd Theory of Cryptography Conference TCC, Spring
-
E. Kiltz, G. Leander, and J. Malone-Lee, Secure Computation of the Mean and Related Statistics, in proceedings of the 2nd Theory of Cryptography Conference (TCC), Spring LNCS vol. 3378, pp. 283-302, 2005.
-
(2005)
LNCS
, vol.3378
, pp. 283-302
-
-
Kiltz, E.1
Leander, G.2
Malone-Lee, J.3
-
7
-
-
84867553981
-
A Generalization, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
-
proceedings of the 4th International Workshop of Practice and Theory in Public Key Cryptography PKC
-
I. Damgard and M. Jurik, A Generalization, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System, in proceedings of the 4th International Workshop of Practice and Theory in Public Key Cryptography (PKC), Springer LNCS vol. 1992, pp. 119-136, 2001.
-
(2001)
Springer LNCS
, vol.1992
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
8
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
proceedings of the International Conference on the Theory and Application of Cryptographic Techniques EUROCRYPT, Spring
-
P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, in proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT), Spring LNCS 1592, pp. 223-238, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
9
-
-
0018545449
-
How to Share a Secret
-
A. Shamir, How to Share a Secret, Communications of the ACM, 22(11): 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
10
-
-
0031628398
-
Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography
-
R. Gennaro, M O. Rabin, and T. Rabin, Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography, in proceedings of the 17th ACM Symposium on Principles of Distributed Computing (PODC), pp. 101-111, 1998.
-
(1998)
proceedings of the 17th ACM Symposium on Principles of Distributed Computing (PODC)
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
-
11
-
-
0346265023
-
On Multiplicative Linear Secret Sharing Schemes
-
V. Nikov, S. Nikova, and B. Preneel, On Multiplicative Linear Secret Sharing Schemes, in proceedings of the 4th International Conference on Cryptology in India (INDOCRYPT), pp. 135-147, 2003.
-
(2003)
proceedings of the 4th International Conference on Cryptology in India (INDOCRYPT)
, pp. 135-147
-
-
Nikov, V.1
Nikova, S.2
Preneel, B.3
-
12
-
-
33744946762
-
-
Available at, 2005
-
F. Bahr, M. Boehm, J. Franke, and T. Kleinjung, RSA200, Available at http://www.cryptoworld.com/announcements/rsa200.txt, 2005.
-
RSA200
-
-
Bahr, F.1
Boehm, M.2
Franke, J.3
Kleinjung, T.4
-
13
-
-
84898960610
-
Completeness Theorems for Non-cryptographic Fault-tolerant Distributed Computations
-
ACM Press, pp
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, Completeness Theorems for Non-cryptographic Fault-tolerant Distributed Computations, in: proceedings of the 20th Annual Symposium on the Theory of Computing (STOC), ACM Press, pp. 110, 1988.
-
(1988)
proceedings of the 20th Annual Symposium on the Theory of Computing (STOC)
, pp. 110
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
14
-
-
73649123789
-
-
Available at Exclusive disjunction
-
Exclusive Disjunction, Available at http://en.wikipedia.org/wiki/ Exclusive disjunction.
-
Exclusive Disjunction
-
-
-
15
-
-
0000653210
-
Selecting Cryptographic Key Sizes
-
A. K. Lenstra and E. R. Verheul, Selecting Cryptographic Key Sizes, Journal of Cryptology, 14(4): 255293, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255293
-
-
Lenstra, A.K.1
Verheul, E.R.2
|