-
4
-
-
0026845445
-
The euclidean definition of the functions div and mod
-
(April) (ACM Press (New York, NY, USA)) doi:10.1145/128861.128862
-
Raymond T. Boute, (April 1992). "The Euclidean definition of the functions div and mod". ACM Transactions on Programming Languages and Systems (TOPLAS) (ACM Press (New York, NY, USA)) 14 (2): 127-144. doi:10.1145/128861.128862
-
(1992)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.14
, Issue.2
, pp. 127-144
-
-
Boute, R.T.1
-
6
-
-
0028675686
-
On the structure of the privacy hierarchy
-
B. Chor, M. Gereb-Graus, and E. Kushilevitz, On the Structure of the Privacy Hierarchy, Journal of Cryptology, 1994, pp. 7: 53-60.
-
(1994)
Journal of Cryptology
, vol.7
, pp. 53-60
-
-
Chor, B.1
Gereb-Graus, M.2
Kushilevitz, E.3
-
7
-
-
0035947794
-
-
B. Chor, Y. Ishai, On Privacy and Partition Arguments, Information and Computation, 2001, pp. 167: 2-9.
-
(2001)
On Privacy and Partition Arguments, Information and Computation
, vol.167
, pp. 2-9
-
-
Chor, B.1
Ishai, Y.2
-
8
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
I. Damgård, M. Jurik: A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. Public Key Cryptography 2001: 119-136.
-
(2001)
Public Key Cryptography
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
9
-
-
38049173951
-
On secure multi-party computation in black-box groups
-
Menezes, A. (ed.) LNCS Springer, Heidelberg
-
Y. Desmedt, J. Pieprzyk, R. Steinfeld, H. Wang: On secure multi-party computation in black-box groups. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 591-612. Springer, Heidelberg (2007)
-
(2007)
CRYPTO 2007
, vol.4622
, pp. 591-612
-
-
Desmedt, Y.1
Pieprzyk, J.2
Steinfeld, R.3
Wang, H.4
-
10
-
-
84874800178
-
Cryptosystem and a signature scheme based on discrete logarithms
-
or CRYPTO 84, pp10-18, Springer-Verlag
-
T. ElGamal, A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, v. IT-31, n. 4, 1985, pp469-472 or CRYPTO 84, pp10-18, Springer-Verlag.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
Public-Key, A.2
-
17
-
-
77956216158
-
-
Milan Italy
-
S. Jha, L. Kruger, and P. McDamiel, Privacy Preserving Clustering, 10th European Symposium On Research In Computer Security, Milan Italy, 2005.
-
(2005)
Privacy Preserving Clustering, 10th European Symposium on Research in Computer Security
-
-
Jha, S.1
Kruger, L.2
McDamiel, P.3
-
20
-
-
85032068914
-
One-factorizations of the complete graph - A survey
-
E. Mendelsohn and A. Rosa, One-factorizations of the complete graph - a survey, J. Graph Theory 9 (1985), pp. 43-65.
-
(1985)
J. Graph Theory
, vol.9
, pp. 43-65
-
-
Mendelsohn, E.1
Rosa, A.2
-
21
-
-
0032218237
-
A new public key cryptosystem based on higher residues
-
ACM press
-
D. Naccache and J. Stern. A New Public Key Cryptosystem Based on Higher Residues. In Proc. of the 5th CCCS. ACM press, 199.
-
(1999)
Proc. of the 5th CCCS
-
-
Naccache, D.1
Stern, J.2
-
22
-
-
84956852274
-
A new public key cryptosystem as secure as factoring
-
Springer-Verlag
-
T. Okamoto and S. Uchiyama. A New Public Key Cryptosystem as Secure as Factoring. In Eurocrypt '98, LNCS 1403, pages 308-318. Springer-Verlag, 1998.
-
(1998)
Eurocrypt '98, LNCS 1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
24
-
-
0000277371
-
Public-key cryptosystems based on composite degree residue classes
-
Springer Verlag LNCS series
-
P. Paillier, Public-Key Cryptosystems based on Composite Degree Residue Classes, Proceedings of EuroCrypt 99, Springer Verlag LNCS series, 1998, pp. 223-238.
-
(1998)
Proceedings of EuroCrypt 99
, pp. 223-238
-
-
Paillier, P.1
-
25
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
doi:10.1145/359340.359342
-
R. Rivest, A. Shamir; L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21 (2): 120-126. doi:10.1145/359340.359342 (1978).
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
28
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
July
-
J. Vaidya, C. Clifton, Secure set intersection cardinality with application to association rule mining, Journal of Computer Security, v. 13 n. 4, p. 593-622, July 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.4
, pp. 593-622
-
-
Vaidya, J.1
Clifton, C.2
|