-
1
-
-
77949623337
-
-
retrieved on August 28, 2009
-
http://www.scdeveloper.com/cards.htm (retrieved on August 28, 2009)
-
-
-
-
2
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 119-135. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 119-135
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
-
3
-
-
38049082907
-
-
Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 137-156. Springer, Heidelberg (2007)
-
Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
-
-
-
-
4
-
-
84928743703
-
Precomputing oblivious transfer
-
Coppersmith, D, ed, CRYPTO 1995, Springer, Heidelberg
-
Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 97-109
-
-
Beaver, D.1
-
5
-
-
85032877753
-
Non-interactive oblivious transfer and applications
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Bellare, M., Micali, S.: Non-interactive oblivious transfer and applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 547-557. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
6
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS, pp. 62-73 (1993)
-
(1993)
ACM CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
44449151536
-
New constructions for uc secure computation using tamper-proof hardware
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Chandran, N., Goyal, V., Sahai, A.: New constructions for uc secure computation using tamper-proof hardware. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 545-562. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 545-562
-
-
Chandran, N.1
Goyal, V.2
Sahai, A.3
-
8
-
-
84944320484
-
-
Di Crescenzo, G.: Private selective payment protocols. In: Frankel, Y. (ed.) FC 2000. LNCS, 1962, pp. 72-89. Springer, Heidelberg (2001)
-
Di Crescenzo, G.: Private selective payment protocols. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 72-89. Springer, Heidelberg (2001)
-
-
-
-
9
-
-
44449160378
-
Isolated proofs of knowledge and isolated zero knowledge
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Damgå rd, I., Nielsen, J.B., Wichs, D.: Isolated proofs of knowledge and isolated zero knowledge. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 509-526. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 509-526
-
-
Damgå rd, I.1
Nielsen, J.B.2
Wichs, D.3
-
10
-
-
70350625407
-
-
Damgård, I., Nielsen, J.B., Wichs, D.: Universally composable multiparty computation with partially isolated parties. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 315-331. Springer, Heidelberg (2009)
-
Damgård, I., Nielsen, J.B., Wichs, D.: Universally composable multiparty computation with partially isolated parties. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 315-331. Springer, Heidelberg (2009)
-
-
-
-
11
-
-
0022080529
-
A randomized protocol for signing contracts
-
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
12
-
-
84937542853
-
-
Fischlin, M.: A cost-effective pay-per-multiplication comparison method for millionaires. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, 2020, pp. 457-471. Springer, Heidelberg (2001)
-
Fischlin, M.: A cost-effective pay-per-multiplication comparison method for millionaires. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 457-471. Springer, Heidelberg (2001)
-
-
-
-
13
-
-
35048896529
-
-
Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 258-277. Springer, Heidelberg (2004)
-
Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 258-277. Springer, Heidelberg (2004)
-
-
-
-
14
-
-
51849168583
-
One-time programs
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: One-time programs. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 39-56. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 39-56
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
15
-
-
77949605211
-
Founding cryptography on tamper-proof hardware tokens
-
Micciancio, D, ed, TCC 2010, Springer, Heidelberg 2010
-
Goyal, V., Ishai, Y., Sahai, A., Venkatesan, R., Wadia, A.: Founding cryptography on tamper-proof hardware tokens. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 308-326. Springer, Heidelberg (2010)
-
LNCS
, vol.5978
, pp. 308-326
-
-
Goyal, V.1
Ishai, Y.2
Sahai, A.3
Venkatesan, R.4
Wadia, A.5
-
16
-
-
44449160882
-
Efficient two party and multi party computation against covert adversaries
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Goyal, V., Mohassel, P., Smith, A.: Efficient two party and multi party computation against covert adversaries. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 289-306. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 289-306
-
-
Goyal, V.1
Mohassel, P.2
Smith, A.3
-
17
-
-
67650699638
-
Resettably secure computation
-
Joux, A, ed, EUROCRYPT 2009, Springer, Heidelberg
-
Goyal, V., Sahai, A.: Resettably secure computation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 54-71. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 54-71
-
-
Goyal, V.1
Sahai, A.2
-
19
-
-
24144457853
-
Extending oblivious transfers effi-ciently
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers effi-ciently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
20
-
-
77949597374
-
-
Järvinen, K., Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Embedded SFE: Offloading server and network using hardware tokens. In: FC 2010 (2010)
-
Järvinen, K., Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Embedded SFE: Offloading server and network using hardware tokens. In: FC 2010 (2010)
-
-
-
-
21
-
-
38049150653
-
Universally composable multi-party computation using tamper-proof hardware
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Katz, J.: Universally composable multi-party computation using tamper-proof hardware. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 115-128. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 115-128
-
-
Katz, J.1
-
22
-
-
33748109704
-
Information-theoretically secure protocols and security under composition
-
Kushilevitz, E., Lindell, Y., Rabin, T.: Information-theoretically secure protocols and security under composition. In: Proc. 38th ACM Symp. on Theory of Computing, pp. 109-118 (2006)
-
(2006)
Proc. 38th ACM Symp. on Theory of Computing
, pp. 109-118
-
-
Kushilevitz, E.1
Lindell, Y.2
Rabin, T.3
-
23
-
-
24744472288
-
A proof of Yao's protocol for secure two-party computation. Cryptology ePrint Archive
-
Report 2004/175
-
Lindell, Y., Pinkas, B.: A proof of Yao's protocol for secure two-party computation. Cryptology ePrint Archive, Report 2004/175 (2004), http://eprint.iacr.org/
-
(2004)
-
-
Lindell, Y.1
Pinkas, B.2
-
24
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
25
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373-386 (1988)
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
26
-
-
64049119146
-
Efficient oblivious transfer protocols
-
Philadelphia, PA, USA. Society for Industrial and Applied Mathematics
-
Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: SODA 2001: Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms, Philadelphia, PA, USA. Society for Industrial and Applied Mathematics (2001)
-
(2001)
SODA 2001: Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms
-
-
Naor, M.1
Pinkas, B.2
-
27
-
-
84883898504
-
Privacy preserving auctions and mechanism design
-
Naor, M., Pinkas, B., Sumner, R.: Privacy preserving auctions and mechanism design. In: 1st ACM Conf. on Electronic Commerce, pp. 129-139 (1999)
-
(1999)
1st ACM Conf. on Electronic Commerce
, pp. 129-139
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
28
-
-
0020312165
-
Protocols for secure computations
-
Chicago, pp, IEEE, Los Alamitos
-
Yao, A.C.: Protocols for secure computations. In: Proc. 23rd IEEE Symp. on Foundations of Comp. Science, Chicago, pp. 160-164. IEEE, Los Alamitos (1982)
-
(1982)
Proc. 23rd IEEE Symp. on Foundations of Comp. Science
, pp. 160-164
-
-
Yao, A.C.1
-
29
-
-
0022882770
-
How to generate and exchange secrets
-
Toronto, pp, IEEE, Los Alamitos
-
Yao, A.C.: How to generate and exchange secrets. In: Proc. 27th IEEE Symp. on Foundations of Comp. Science, Toronto, pp. 162-167. IEEE, Los Alamitos (1986)
-
(1986)
Proc. 27th IEEE Symp. on Foundations of Comp. Science
, pp. 162-167
-
-
Yao, A.C.1
|