-
1
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction
-
Rudnicki, P, editor, New York. ACM Press
-
Bar-Ilan, J. and Beaver, D. (1989). Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction. In Rudnicki, P., editor, Proceedings of the eighth annual ACM Symposium on Principles of distributed computing, pages 201-209, New York. ACM Press.
-
(1989)
Proceedings of the eighth annual ACM Symposium on Principles of distributed computing
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
2
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
ACM Press
-
Ben-Or, M., Goldwasser, S., and Wigderson, A. (1988). Completeness theorems for noncryptographic fault-tolerant distributed computations. In 20th Annual ACM Symposium on Theory of Computing, pages 1-10. ACM Press.
-
(1988)
20th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
74549120501
-
-
Bogetoft, P., Christensen, D., Dåmgard, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J., Nielsen, J., Nielsen, K., Pagter, J., Schwartzbach, M., and Toft, T. (2008). Multi-party computation goes live. Cryptology ePrint Archive, Report 2008/068.
-
Bogetoft, P., Christensen, D., Dåmgard, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J., Nielsen, J., Nielsen, K., Pagter, J., Schwartzbach, M., and Toft, T. (2008). Multi-party computation goes live. Cryptology ePrint Archive, Report 2008/068.
-
-
-
-
4
-
-
47949096726
-
Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications
-
RS-05-18, BRICS
-
Bogetoft, P., Damgård, I., Jakobsen, T., Nielsen, K., Pagter, J., and Toft, T. (2005). Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications. BRICS Report Series RS-05-18, BRICS. http://www.brics.dk/RS/05/18/.
-
(2005)
BRICS Report Series
-
-
Bogetoft, P.1
Damgård, I.2
Jakobsen, T.3
Nielsen, K.4
Pagter, J.5
Toft, T.6
-
5
-
-
33745567199
-
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
-
Halevi, S. and Rabin, T, editors, Theory of Cryptography, of, Springer
-
Damgård, I., Fitzi, M., Kiltz, E., Nielsen, J., and Toft, T. (2006). Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In Halevi, S. and Rabin, T., editors, Theory of Cryptography, volume 3876 of Lecture Notes in Computer Science (LNCS), pages 285-304. Springer.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 285-304
-
-
Damgård, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.4
Toft, T.5
-
6
-
-
84937542853
-
A cost-effective pay-per-multiplication comparison method for millionaires
-
Naccache, D, editor, Topics in Cryptology, CT-RSA 2001, of, Springer-Verlag, Berlin, Germany
-
Fischlin, M. (2001). A cost-effective pay-per-multiplication comparison method for millionaires. In Naccache, D., editor, Topics in Cryptology - CT-RSA 2001, volume 2020 of Lecture Notes in Computer Science, pages 457-471. Springer-Verlag, Berlin, Germany.
-
(2001)
Lecture Notes in Computer Science
, vol.2020
, pp. 457-471
-
-
Fischlin, M.1
-
7
-
-
0031628398
-
Simplified vss and fast-track multiparty computations with applications to threshold cryptography
-
New York, NY, USA. ACM Press
-
Gennaro, R., Rabin, M., and Rabin, T. (1998). Simplified vss and fast-track multiparty computations with applications to threshold cryptography. In PODC '98: Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, pages 101-111, New York, NY, USA. ACM Press.
-
(1998)
PODC '98: Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.2
Rabin, T.3
-
8
-
-
38049034355
-
Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
-
PKC 2007 International Workshop on Theory and Practice in Public Key Cryptography, Springer-Verlag, Berlin, Germany
-
Nishide, T. and Ohta, K. (2007). Multiparty computation for interval, equality, and comparison without bit-decomposition protocol. In PKC 2007 International Workshop on Theory and Practice in Public Key Cryptography, Lecture Notes in Computer Science. Springer-Verlag, Berlin, Germany.
-
(2007)
Lecture Notes in Computer Science
-
-
Nishide, T.1
Ohta, K.2
-
10
-
-
35048828873
-
Practical two-party computation based on the conditional gate
-
Lee, P. J, editor, Advances in Cryptology, ASIACRYPT 2004, of, Springer-Verlag, Berlin, Germany
-
Schoenmakers, B. and Tuyls, P. (2004). Practical two-party computation based on the conditional gate. In Lee, P. J., editor, Advances in Cryptology - ASIACRYPT 2004, volume 3329 of Lecture Notes in Computer Science, pages 119-136. Springer-Verlag, Berlin, Germany.
-
(2004)
Lecture Notes in Computer Science
, vol.3329
, pp. 119-136
-
-
Schoenmakers, B.1
Tuyls, P.2
-
11
-
-
0018545449
-
How to share a secret
-
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11):612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|