-
2
-
-
0023565941
-
Generalized string matching
-
Karl R. Abrahamson. Generalized string matching. SIAM J. Comput., 16(6):1039-1051, 1987.
-
(1987)
SIAM J. Comput.
, vol.16
, Issue.6
, pp. 1039-1051
-
-
Abrahamson, K.R.1
-
3
-
-
77956778645
-
Secure outsourcing of scientific computations
-
M. J. Atallah, K. N. Pantazopoulos, J. Rice, and E. H. Spafford. Secure outsourcing of scientific computations. Advances in Computers, 54(6):215-272, 2001.
-
(2001)
Advances in Computers
, vol.54
, Issue.6
, pp. 215-272
-
-
Atallah, M.J.1
Pantazopoulos, K.N.2
Rice, J.3
Spafford, E.H.4
-
5
-
-
84957639068
-
Fast server-aided rsa signatures secure against active attacks
-
P. Beguin and J. J. Quisquater. Fast server-aided rsa signatures secure against active attacks. In CRYPT0 95, pages 57-69, 1995.
-
(1995)
CRYPT0 95
, pp. 57-69
-
-
Beguin, P.1
Quisquater, J.J.2
-
6
-
-
67650080189
-
Private and cheating-free outsourcing of algebraic computations
-
David Benjamin and Mikhail J. Atallah. Private and cheating-free outsourcing of algebraic computations. In Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pages 240-245, 2008.
-
(2008)
Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada
, pp. 240-245
-
-
Benjamin, D.1
Atallah, M.J.2
-
8
-
-
0034782679
-
Selective private function evaluation with applications to private statistics
-
ACM Press
-
Ran Canetti, Yuval Ishai, Ravi Kumar, Michael Reiter, Ronitt Rubinfeld, and Rebecca Wri ght. Selective private function evaluation with applications to private statistics. In Proceedings of the twentieth annual ACM symposium on Principles of distributed computing, pages 293-304. ACM Press, 2001.
-
(2001)
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing
, pp. 293-304
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.4
Rubinfeld, R.5
Wright, R.6
-
10
-
-
33745124039
-
Constant-round multiparty computation using a black-box pseudorandom generator
-
Advances in Cryptology (CRYPT0 05), Springer-Verlag
-
I. Damgård and Y. Ishai. Constant-round multiparty computation using a black-box pseudorandom generator. In Advances in Cryptology (CRYPT0 05), volume LNCS 3621, pages 378-394. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 378-394
-
-
Damgård, I.1
Ishai, Y.2
-
11
-
-
33745124039
-
Constant-round multiparty computation using a black-box pseudorandom generator
-
Advances in Cryptology (CRYPT0 05), Springer-Verlag
-
Ivan Damgård and Yuval Ishai. Constant-round multiparty computation using a black-box pseudorandom generator. In Advances in Cryptology (CRYPT0 05), volume LNCS 3621, pages 378-394. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 378-394
-
-
Damgård, I.1
Ishai, Y.2
-
13
-
-
26444461543
-
Searching for high-value rare events with uncheatable grid computing
-
Wenliang Du and Michael T. Goodrich. Searching for high-value rare events with uncheatable grid computing. In Proc. ACNS, pages 122-137, 2005.
-
(2005)
Proc. ACNS
, pp. 122-137
-
-
Du, W.1
Goodrich, M.T.2
-
14
-
-
2442421200
-
Uncheatable grid computing
-
Wenliang Du, Jing Jia, Manish Mangal, and Mummoorthy Murugesan. Uncheatable grid computing. In Proc. ICDCS, pages 4-11, 2004.
-
(2004)
Proc. ICDCS
, pp. 4-11
-
-
Du, W.1
Jia, J.2
Mangal, M.3
Murugesan, M.4
-
19
-
-
24144493423
-
How to securely outsource cryptographic computations
-
Theory of Cryptography Conference (TCC'05)
-
Susan Hohenberger and Anna Lysyanskaya. How to securely outsource cryptographic computations. In Theory of Cryptography Conference (TCC'05), volume 3378 of LNCS, pages 264-282, 2005.
-
(2005)
LNCS
, vol.3378
, pp. 264-282
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
20
-
-
77954516959
-
Round optimal secure two-party computation
-
Jonathan Katz and Rafail Ostrovsky. Round optimal secure two-party computation. In CRYPTO 04, 2004.
-
CRYPTO 04, 2004
-
-
Katz, J.1
Ostrovsky, R.2
-
21
-
-
0027617773
-
Fast server-aided secret computation protocols for modular exponentiation
-
S. I. Kawamura and A. Shimbo. Fast server-aided secret computation protocols for modular exponentiation. IEEE Journal on Selected Areas in Communications, 11(5):778-784, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 778-784
-
-
Kawamura, S.I.1
Shimbo, A.2
-
22
-
-
84957648348
-
Security and performance of server-aided rsa computation protocols
-
C. H. Lim and P. J. Lee. Security and performance of server-aided rsa computation protocols. In CRYPT0 95, pages 70-83, 1995.
-
(1995)
CRYPT0 95
, pp. 70-83
-
-
Lim, C.H.1
Lee, P.J.2
-
23
-
-
35048833033
-
Parallel coin-tossing and constant-round secure two-party computation
-
Yehuda Lindell. Parallel coin-tossing and constant-round secure two-party computation. Lecture Notes in Computer Science, 2139:171-189, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 171-189
-
-
Lindell, Y.1
-
25
-
-
85031767993
-
Speeding up secret computations with insecure auxiliary devices
-
T. Matsumoto, K. Kato, and H. Imai. Speeding up secret computations with insecure auxiliary devices. In CRYPT0 88, pages 497-506, 1988.
-
(1988)
CRYPT0 88
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
26
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Advances in Cryptology: EUROCRYPT '99, Springer
-
Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology: EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 223-238. Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
27
-
-
84955578798
-
Attacks on protocols for server-aided rsa computations
-
B. Pfitzmann and M. Waidner. Attacks on protocols for server-aided rsa computations. In EUROCRYPT 92, pages 153-162, 1992.
-
(1992)
EUROCRYPT 92
, pp. 153-162
-
-
Pfitzmann, B.1
Waidner, M.2
-
30
-
-
0018545449
-
How to share a secret
-
Adi Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|