-
1
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation (extended abstract)
-
ACM, New York
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation (extended abstract). In: STOC, pp. 1-10. ACM, New York (1988)
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
2
-
-
57049188348
-
Sharemind: A framework for fast privacypreserving computations
-
Jajodia, S., Lopez, J. (eds.) Springer, Heidelberg, ESORICS 2008
-
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A framework for fast privacypreserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.5283, pp. 192-206. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
3
-
-
70350379222
-
Secure multiparty computation goes live
-
Dingledine, R., Golle, P. (eds.) Springer, Heidelberg, FC 2009
-
Bogetoft, P., Christensen, D.L., Damgard, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M.I., Toft, T.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.5628, pp. 325-343. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5628
, pp. 325-343
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgard, I.3
Geisler, M.4
Jakobsen, T.5
Krøigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.I.11
Toft, T.12
-
4
-
-
84898947315
-
Multiparty unconditionally secure protocols (extended abstract)
-
ACM, New York
-
Chaum, D., Cŕepeau, C., Damgard, I.: Multiparty unconditionally secure protocols (extended abstract). In: STOC, pp. 11-19. ACM, New York (1988)
-
(1988)
STOC
, pp. 11-19
-
-
Chaum, D.1
Cŕepeau, C.2
Damgard, I.3
-
5
-
-
21144458613
-
Share conversion, pseudorandom secret-sharing and applications to secure computation
-
Kilian, J. (ed.) Springer, Heidelberg, TCC 2005
-
Cramer, R., Damgard, I., Ishai, Y.: Share conversion, pseudorandom secret-sharing and applications to secure computation. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.3378, pp. 342-362. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3378
, pp. 342-362
-
-
Cramer, R.1
Damgard, I.2
Ishai, Y.3
-
6
-
-
67049134126
-
Asynchronous multiparty computation: Theory and implementation
-
Jarecki, S., Tsudik, G. (eds.) Springer, Heidelberg, PKC 2009
-
Damgard, I., Geisler, M., Krøigaard, M., Nielsen, J.B.: Asynchronous multiparty computation: Theory and implementation. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol.5443, pp. 160-179. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 160-179
-
-
Damgard, I.1
Geisler, M.2
Krøigaard, M.3
Nielsen, J.B.4
-
8
-
-
77955332220
-
VIFF: Virtual ideal functionality framework
-
Geisler, M.: VIFF: Virtual ideal functionality framework. Homepage (2007), http://viff.dk/
-
(2007)
Homepage
-
-
Geisler, M.1
-
9
-
-
85084163840
-
Fairplay - Secure two-party computation system
-
USENIX
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - secure two-party computation system. In: USENIX Security Symposium, pp. 287-302. USENIX (2004)
-
(2004)
USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
10
-
-
77956992104
-
Secure two-party computation is practical
-
Pinkas, B., Schneider, T., Smart, N., Williams, S.: Secure two-party computation is practical. In: Cryptology ePrint Archive, Report 2009/314 (2009), http://eprint.iacr.org/
-
(2009)
Cryptology EPrint Archive, Report 2009/314
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.3
Williams, S.4
-
11
-
-
0003508558
-
Advanced encryption standard
-
FIPS Publications. National Institute of Standards and Technology (November)
-
FIPS Publications. Advanced Encryption Standard. Technical Report FIPS PUB 197, National Institute of Standards and Technology (November 2001)
-
(2001)
Technical Report FIPS PUB 197
-
-
-
12
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. ACM Commun. 22(11), 612-613 (1979)
-
(1979)
ACM Commun
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
13
-
-
0022882770
-
How to generate and exchange secrets (extended abstract)
-
IEEE, Los Alamitos
-
Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167. IEEE, Los Alamitos (1986)
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.-C.1
|