-
1
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious rams. J. ACM 43(3), 431-473 (1996)
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
2
-
-
85001025766
-
Wallet databases with observers
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
3
-
-
84867248592
-
Untraceable off-line cash in wallets with observers (extended abstract)
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Brands, S.: Untraceable off-line cash in wallets with observers (extended abstract). In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302-318. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 302-318
-
-
Brands, S.1
-
4
-
-
84988327580
-
Improved privacy in wallets with observers (extended abstract)
-
Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
-
Cramer, R., Pedersen, T.P.: Improved privacy in wallets with observers (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 329-343. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 329-343
-
-
Cramer, R.1
Pedersen, T.P.2
-
5
-
-
35248830337
-
Private circuits: Securing hardware against probing attacks
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Ishai, Y., Sahai, A., Wagner, D.: Private circuits: Securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
6
-
-
35048896529
-
-
Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 258-277. Springer, Heidelberg (2004)
-
Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 258-277. Springer, Heidelberg (2004)
-
-
-
-
7
-
-
38049039055
-
Universally composable zero-knowledge arguments and commitments from signature cards
-
Hofheinz, D., Müller-quade, J., Unruh, D.: Universally composable zero-knowledge arguments and commitments from signature cards. In: Proc. of the 5th Central European Conference on Cryptology MoraviaCrypt 2005, Mathematical Publications (2005)
-
(2005)
Proc. of the 5th Central European Conference on Cryptology MoraviaCrypt 2005, Mathematical Publications
-
-
Hofheinz, D.1
Müller-quade, J.2
Unruh, D.3
-
8
-
-
26444553313
-
-
Moran, T., Naor, M.: Basing cryptographic protocols on tamper-evident seals. In: Caires, L., Italiano,G.F., Monteiro, L.,Palamidessi, C.,Yung,M. (eds.) ICALP2005. LNCS, 3580, pp. 285-297. Springer, Heidelberg (2005)
-
Moran, T., Naor, M.: Basing cryptographic protocols on tamper-evident seals. In: Caires, L., Italiano,G.F., Monteiro, L.,Palamidessi, C.,Yung,M. (eds.) ICALP2005. LNCS, vol. 3580, pp. 285-297. Springer, Heidelberg (2005)
-
-
-
-
9
-
-
38049150653
-
Universally composable multi-party computation using tamper-proof hardware
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Katz, J.: Universally composable multi-party computation using tamper-proof hardware. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 115-128. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 115-128
-
-
Katz, J.1
-
10
-
-
44449151536
-
New constructions for UC secure computation using tamper-proof hardware
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Chandran, N., Goyal, V., Sahai, A.: New constructions for UC secure computation using tamper-proof hardware. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 545-562. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 545-562
-
-
Chandran, N.1
Goyal, V.2
Sahai, A.3
-
11
-
-
44449101614
-
David and Goliath commitments: UC computation for asymmetric parties using tamper-proof hardware
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Moran, T., Segev, G.: David and Goliath commitments: UC computation for asymmetric parties using tamper-proof hardware. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 527-544. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 527-544
-
-
Moran, T.1
Segev, G.2
-
12
-
-
44449160378
-
Isolated proofs of knowledge and isolated zero knowledge
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Damgård, I., Nielsen, J.B., Wichs, D.: Isolated proofs of knowledge and isolated zero knowledge. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 509-526. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 509-526
-
-
Damgård, I.1
Nielsen, J.B.2
Wichs, D.3
-
13
-
-
51849168583
-
One-time programs
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Goldwasser, S., Kalai, Y.T., Rothblum, G.: One-time programs. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 39-56. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 39-56
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.3
-
14
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145 (2001)
-
(2001)
FOCS
, pp. 136-145
-
-
Canetti, R.1
-
15
-
-
0002738457
-
A zero-one law for boolean privacy
-
Chor, B., Kushilevitz, E.: A zero-one law for boolean privacy. SIAM J. Discrete Math. 4(1), 36-47 (1991)
-
(1991)
SIAM J. Discrete Math
, vol.4
, Issue.1
, pp. 36-47
-
-
Chor, B.1
Kushilevitz, E.2
-
17
-
-
0022080529
-
A randomized protocol for signing contracts
-
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
18
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
Kilian, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20-31 (1988)
-
(1988)
STOC
, pp. 20-31
-
-
Kilian, J.1
-
19
-
-
51849102397
-
Founding cryptography on oblivious transfer - efficiently
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer - efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 572-591
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
20
-
-
70349276910
-
Constructions of truly practical secure protocols using standardsmartcards
-
Ning, P, Syverson, P.F, Jha, S, eds, ACM, New York
-
Hazay, C., Lindell, Y.: Constructions of truly practical secure protocols using standardsmartcards. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM Conference on Computer and Communications Security, pp. 491-500. ACM, New York (2008)
-
(2008)
ACM Conference on Computer and Communications Security
, pp. 491-500
-
-
Hazay, C.1
Lindell, Y.2
-
21
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229 (1987)
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
67650699638
-
Resettably secure computation
-
Joux, A, ed, EUROCRYPT 2009, Springer, Heidelberg
-
Goyal, V., Sahai, A.: Resettably secure computation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 54-71. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 54-71
-
-
Goyal, V.1
Sahai, A.2
-
23
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.P.6
Yang, K.7
-
24
-
-
33746066725
-
Private circuits ii: Keeping secrets in tamperable circuits
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A., Wagner, D.: Private circuits ii: Keeping secrets in tamperable circuits. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 308-327. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 308-327
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
Wagner, D.4
-
26
-
-
77949599668
-
Truly efficient string oblivious transfer using resettable tamperproof tokens
-
Micciancio, D, ed, TCC 2010, Springer, Heidelberg 2010
-
Kolesnikov, V.: Truly efficient string oblivious transfer using resettable tamperproof tokens. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978. Springer, Heidelberg (2010)
-
LNCS
, vol.5978
-
-
Kolesnikov, V.1
-
27
-
-
33845541381
-
Implications of superstrong nonlocality for cryptography
-
Buhrman, H., Christandl, M., Unger, F., Wehner, S., Winter, A.: Implications of superstrong nonlocality for cryptography. Proceedings of the Royal Society A 462(2071), 1919-1932
-
(1919)
Proceedings of the Royal Society A
, vol.462
, Issue.2071
-
-
Buhrman, H.1
Christandl, M.2
Unger, F.3
Wehner, S.4
Winter, A.5
-
28
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145 (2001)
-
(2001)
FOCS
, pp. 136-145
-
-
Canetti, R.1
-
29
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation (extended abstract)
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation (extended abstract). In: STOC, pp. 1-10 (1988)
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
30
-
-
0002365530
-
Privacy and communication complexity
-
Kushilevitz, E.: Privacy and communication complexity. SIAM J. Discrete Math. 5(2), 273-284 (1992)
-
(1992)
SIAM J. Discrete Math
, vol.5
, Issue.2
, pp. 273-284
-
-
Kushilevitz, E.1
-
31
-
-
85032194875
-
How to solve any protocol problem - an efficiency improvement
-
Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
-
Goldreich, O., Vainish, R.: How to solve any protocol problem - an efficiency improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 73-86. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
32
-
-
84976655650
-
Cryptographic computation: Secure faut-tolerant protocols and the public-key model
-
Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
-
Galil, Z., Haber, S., Yung, M.: Cryptographic computation: Secure faut-tolerant protocols and the public-key model. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 135-155. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
35
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
36
-
-
0029702967
-
Correlated pseudorandomness and the complexity of private computations
-
Beaver, D.: Correlated pseudorandomness and the complexity of private computations. In: STOC, pp. 479-488 (1996)
-
(1996)
STOC
, pp. 479-488
-
-
Beaver, D.1
-
37
-
-
0022882770
-
How to generate and share secrets
-
Yao, A.: How to generate and share secrets. In: FOCS, pp. 162-167 (1986)
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.1
-
38
-
-
84869164571
-
Perfect constant-round secure computation via perfect randomizing polynomials
-
Widmayer, P, Triguero, F, Morales, R, Hennessy, M, Eidenbenz, S, Conejo, R, eds, ICALP 2002, Springer, Heidelberg
-
Ishai, Y., Kushilevitz, E.: Perfect constant-round secure computation via perfect randomizing polynomials. In: Widmayer, P., Triguero, F., Morales, R., Hennessy, M., Eidenbenz, S., Conejo, R. (eds.) ICALP 2002. LNCS, vol. 2380, pp. 244-256. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2380
, pp. 244-256
-
-
Ishai, Y.1
Kushilevitz, E.2
-
39
-
-
0027986369
-
A minimal model for secure computation (extended abstract)
-
Feige, U., Kilian, J., Naor, M.: A minimal model for secure computation (extended abstract). In: STOC, pp. 554-563 (1994)
-
(1994)
STOC
, pp. 554-563
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
40
-
-
0030283655
-
Oblivious transfers and intersecting codes
-
Brassard, G., Crépeau, C., Santha, M.: Oblivious transfers and intersecting codes. IEEE Transactions on Information Theory 42(6), 1769-1780 (1996)
-
(1996)
IEEE Transactions on Information Theory
, vol.42
, Issue.6
, pp. 1769-1780
-
-
Brassard, G.1
Crépeau, C.2
Santha, M.3
-
41
-
-
0024769014
-
-
Beaver, D., Goldwasser, S.: Multiparty computation with faulty majority (extended announcement). In: FOCS, pp. 468-473. IEEE, Los Alamitos (1989)
-
Beaver, D., Goldwasser, S.: Multiparty computation with faulty majority (extended announcement). In: FOCS, pp. 468-473. IEEE, Los Alamitos (1989)
-
-
-
-
42
-
-
35448982726
-
Statistically-hiding commitment from any one-way function
-
Haitner, I., Reingold, O.: Statistically-hiding commitment from any one-way function. In: STOC, pp. 1-10 (2007)
-
(2007)
STOC
, pp. 1-10
-
-
Haitner, I.1
Reingold, O.2
-
43
-
-
70749087413
-
On the secure obfuscation of deterministic nite automata. Cryptology ePrint Archive
-
Report 2008/184
-
Anderson, W.E.: On the secure obfuscation of deterministic nite automata. Cryptology ePrint Archive, Report 2008/184 (2008)
-
(2008)
-
-
Anderson, W.E.1
-
44
-
-
0033723965
-
Resettable zero-knowledge (extended abstract)
-
Canetti, R., Goldreich, O., Goldwasser, S., Micali, S.: Resettable zero-knowledge (extended abstract). In: STOC, pp. 235-244 (2000)
-
(2000)
STOC
, pp. 235-244
-
-
Canetti, R.1
Goldreich, O.2
Goldwasser, S.3
Micali, S.4
|