-
1
-
-
38049032820
-
How to shuffle in public
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Adida, B., Wikstrom, D.: How to shuffle in public. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 555-574. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 555-574
-
-
Adida, B.1
Wikstrom, D.2
-
2
-
-
34248585738
-
Decoding interleaved Reed-Solomon codes over noisy channels
-
DOI 10.1016/j.tcs.2007.02.043, PII S0304397507001351, Automata, Languages and Programming
-
Bleichenbacher, D., Kiayias, A., Yung, M.: Decoding interleaved reed-solomon codes over noisy channels. Theoretical Computer Science 379, 348-360 (2007) (Pubitemid 46754585)
-
(2007)
Theoretical Computer Science
, vol.379
, Issue.3
, pp. 348-360
-
-
Bleichenbacher, D.1
Kiayias, A.2
Yung, M.3
-
3
-
-
49049118519
-
Fuzzy private matching
-
extended abstract. IEEE CS Press, Los Alamitos
-
Chmielewski, L., Hoepman, J.-H.: Fuzzy private matching (extended abstract). In: The 3rd International Conference on Availability, Security and Reliability, pp. 327-334. IEEE CS Press, Los Alamitos (2008)
-
(2008)
The 3rd International Conference on Availability, Security and Reliability
, pp. 327-334
-
-
Chmielewski, L.1
Hoepman, J.-H.2
-
4
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
5
-
-
0033183669
-
Improved decoding of Reed-Solomon and algebraic-geometry codes
-
DOI 10.1109/18.782097
-
Guruswami, V., Sudan, M.: Improved decoding of reed-solomon and algebraic-geometric codes. IEEE Transactions on Information Theory 45, 1757-1767 (1999) (Pubitemid 32871911)
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.6
, pp. 1757-1767
-
-
Guruswami, V.1
Sudan, M.2
-
6
-
-
33745565439
-
Polylogarithmic private approximations and efficient matching
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Indyk, P., Woodruff, D.: Polylogarithmic private approximations and efficient matching. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 245-264. Springer, Heidelberg (2006);
-
LNCS
, vol.3876
, Issue.2006
, pp. 245-264
-
-
Indyk, P.1
Woodruff, D.2
-
8
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - a secure two-party computation system. In: Proceedings of the 13th USENIX Security Symposium. USENIX Association (2004)
-
Proceedings of the 13th USENIX Security Symposium. USENIX Association (2004)
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
9
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
-
Okamoto, T., Uchiyama, S.: A new public-key cryptosystem as secure as factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 308-318. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
10
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
12
-
-
84976779342
-
Fast probabilistic algorithms for verification of polynomial identities
-
Schwartz, J.: Fast probabilistic algorithms for verification of polynomial identities. Journal of the ACM 27, 701-717 (1980)
-
(1980)
Journal of the ACM
, vol.27
, pp. 701-717
-
-
Schwartz, J.1
-
13
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Communications of the ACM 22, 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
14
-
-
0022882770
-
How to generate and exchange secrets
-
Yao, A.: How to generate and exchange secrets. In: Proceedings of the 27th FOCS, pp. 162-167 (1986)
-
(1986)
Proceedings of the 27th FOCS
, pp. 162-167
-
-
Yao, A.1
|