-
1
-
-
70350342511
-
Fast cryptographic primitives and circular-secure encryption based on hard learning problems
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 595-618
-
-
Applebaum, B.1
Cash, D.2
Peikert, C.3
Sahai, A.4
-
2
-
-
40349089019
-
Perfectly-secure MPC with linear communication complexity
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Beerliová-Trubíniová, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 213-230. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 213-230
-
-
Beerliová-Trubíniová, Z.1
Hirt, M.2
-
3
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
(extended abstract). ACM, New York
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation (extended abstract). In: STOC, pp. 1-10. ACM, New York (1988)
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
27644561824
-
Short pcps verifiable in polylogarithmic time
-
IEEE Computer Society, Los Alamitos
-
Ben-Sasson, E., Goldreich, O., Harsha, P., Sudan, M., Vadhan, S.P.: Short pcps verifiable in polylogarithmic time. In: IEEE Conference on Computational Complexity, pp. 120-134. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
IEEE Conference on Computational Complexity
, pp. 120-134
-
-
Ben-Sasson, E.1
Goldreich, O.2
Harsha, P.3
Sudan, M.4
Vadhan, S.P.5
-
5
-
-
84915669489
-
Optimal rearrangable multistage connecting networks
-
Benes, V.E.: Optimal rearrangable multistage connecting networks. The Bell System Technical Journal 43, 1641-1656 (1964)
-
(1964)
The Bell System Technical Journal
, vol.43
, pp. 1641-1656
-
-
Benes, V.E.1
-
6
-
-
0023436302
-
An O(log n) expected rounds randomized byzantine generals protocol
-
Bracha, G.: An O(log n) expected rounds randomized byzantine generals protocol. J. ACM 34(4), 910-920 (1987)
-
(1987)
J. ACM
, vol.34
, Issue.4
, pp. 910-920
-
-
Bracha, G.1
-
7
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE Computer Society, Los Alamitos
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS 2001: Proceedings of the 42nd IEEE symposium on Foundations of Computer Science, Washington, DC, USA, pp. 136-145. IEEE Computer Society, Los Alamitos (2001)
-
(2001)
FOCS 2001: Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science, Washington, DC, USA
, pp. 136-145
-
-
Canetti, R.1
-
8
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
ACM, New York
-
Chaum, D., Crépeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: STOC 1988: Proceedings of the twentieth annual ACM symposium on Theory of computing, pp. 11-19. ACM, New York (1988)
-
(1988)
STOC 1988: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgard, I.3
-
9
-
-
33749554579
-
Algebraic geometric secret sharing schemes and secure multiparty computations over small fields
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Chen, H., Cramer, R.: Algebraic geometric secret sharing schemes and secure multiparty computations over small fields. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 521-536. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 521-536
-
-
Chen, H.1
Cramer, R.2
-
10
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280-299. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 280-299
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
11
-
-
33749557660
-
Scalable secure multiparty computation
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Damgård, I., Ishai, Y.: Scalable secure multiparty computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 501-520. Springer, Heidelberg (2006) (Pubitemid 44532135)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117 LNCS
, pp. 501-520
-
-
Damgard, I.1
Ishai, Y.2
-
12
-
-
77954630115
-
Perfectly secure multiparty computation and the computational overhead of cryptography
-
report 2010/131
-
Damgård, I., Ishai, Y., Krøigaard, M.: Perfectly secure multiparty computation and the computational overhead of cryptography. Cryptology ePrint archive, report 2010/131 (2010), http://eprint.iacr.org/
-
(2010)
Cryptology EPrint Archive
-
-
Damgård, I.1
Ishai, Y.2
Krøigaard, M.3
-
13
-
-
51849125042
-
Scalable multiparty computation with nearly optimal work and resilience
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Damgård, I., Ishai, Y., Krøigaard, M., Nielsen, J.B., Smith, A.: Scalable multiparty computation with nearly optimal work and resilience. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 241-261. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 241-261
-
-
Damgård, I.1
Ishai, Y.2
Krøigaard, M.3
Nielsen, J.B.4
Smith, A.5
-
14
-
-
0026985378
-
Communication complexity of secure computation
-
(extended abstract). ACM, New York
-
Franklin, M.K., Yung, M.: Communication complexity of secure computation (extended abstract). In: STOC, pp. 699-710. ACM, New York (1992)
-
(1992)
STOC
, pp. 699-710
-
-
Franklin, M.K.1
Yung, M.2
-
15
-
-
0031628398
-
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
-
ACM, New York
-
Gennaro, R., Rabin, M.O., Rabin, T.: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In: PODC 1998: Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, pp. 101-111. ACM, New York (1998)
-
(1998)
PODC 1998: Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
-
17
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
ACM, New York
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
18
-
-
33745999816
-
Player simulation and general adversary structures in perfect multiparty computation
-
Hirt, M., Maurer, U.M.: Player simulation and general adversary structures in perfect multiparty computation. J. Cryptology 13(1), 31-60 (2000)
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 31-60
-
-
Hirt, M.1
Maurer, U.M.2
-
19
-
-
35248861868
-
Efficient secure multi-party computation
-
Springer, Heidelberg
-
Hirt, M., Maurer, U.M., Przydatek, B.: Efficient secure multi-party computation. In: ASIACRYPT 2000: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security, London, UK, pp. 143-161. Springer, Heidelberg (2000)
-
(2000)
ASIACRYPT 2000: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security, London, UK
, pp. 143-161
-
-
Hirt, M.1
Maurer, U.M.2
Przydatek, B.3
-
20
-
-
35448945589
-
Zero-knowledge from secure multiparty computation
-
ACM, New York
-
Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Zero-knowledge from secure multiparty computation. In: STOC 2007: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, pp. 21-30. ACM, New York (2007)
-
(2007)
STOC 2007: Proceedings of the Thirty-ninth Annual ACM Symposium on Theory of Computing
, pp. 21-30
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
21
-
-
57049124387
-
Cryptography with constant computational overhead
-
ACM, New York
-
Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Cryptography with constant computational overhead. In: STOC 2008: Proceedings of the 40th annual ACM symposium on Theory of computing, pp. 433-442. ACM, New York (2008)
-
(2008)
STOC 2008: Proceedings of the 40th Annual ACM Symposium on Theory of Computing
, pp. 433-442
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
22
-
-
51849102397
-
Founding cryptography on oblivious transfer - Efficiently
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer - efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 572-591
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
24
-
-
33746342484
-
Generalized compact knapsacks are collision resistant
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D.: Generalized compact knapsacks are collision resistant. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 144-155. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 144-155
-
-
Lyubashevsky, V.1
Micciancio, D.2
-
25
-
-
0034854953
-
Computationally sound proofs
-
Micali, S.: Computationally sound proofs. SIAM J. Comput. 30(4), 1253-1298 (2000)
-
(2000)
SIAM J. Comput.
, vol.30
, Issue.4
, pp. 1253-1298
-
-
Micali, S.1
-
26
-
-
33745559478
-
Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 145-166. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 145-166
-
-
Peikert, C.1
Rosen, A.2
-
28
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
29
-
-
0000648555
-
A permutation network
-
Waksman, A.: A permutation network. J. ACM 15(1), 159-163 (1968)
-
(1968)
J. ACM
, vol.15
, Issue.1
, pp. 159-163
-
-
Waksman, A.1
|