-
2
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Kilian, J. (ed.) Springer, Heidelberg
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
-
(2005)
TCC 2005. LNCS
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
3
-
-
38049138213
-
Public key encryption that allows PIR queries
-
Menezes, A. (ed.) Springer, Heidelberg
-
Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith, W.E.: Public key encryption that allows PIR queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50-67. Springer, Heidelberg (2007)
-
(2007)
CRYPTO 2007. LNCS
, vol.4622
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith, W.E.4
-
4
-
-
0036287602
-
Randomness conductors and constant-degree lossless expanders
-
Capalbo, M.R., Reingold, O., Vadhan, S.P., Wigderson, A.: Randomness conduc-tors and constant-degree lossless expanders. In: IEEE Conference on Computa-tional Complexity, p. 15 (2002) (Pubitemid 34691882)
-
(2002)
Proceedings of the Annual IEEE Conference on Computational Complexity
, pp. 15
-
-
Capalbo, M.1
Reingold, O.2
Vadhan, S.3
Wigderson, A.4
-
6
-
-
77951106449
-
Multi-autority secret-ballot elections with linear work
-
Maurer, U.M. (ed.) Springer, Heidelberg
-
Cramer, R., Franklin, M.K., Schoenmakers, B., Yung, M.: Multi-autority secret-ballot elections with linear work. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 72-83. Springer, Heidelberg (1996)
-
(1996)
EUROCRYPT 1996. LNCS
, vol.1070
, pp. 72-83
-
-
Cramer, R.1
Franklin, M.K.2
Schoenmakers, B.3
Yung, M.4
-
7
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
Advances in Cryptology - Eurocrypt '97
-
Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103-118. Springer, Heidelberg (1997) (Pubitemid 127067797)
-
(1997)
LNCS
, Issue.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
11
-
-
34748894441
-
Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes
-
Guruswami, V., Umans, C., Vadhan, S.P.: Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes. In: IEEE Conference on Computational Complexity, pp. 96-108 (2007)
-
(2007)
IEEE Conference on Computational Complexity
, pp. 96-108
-
-
Guruswami, V.1
Umans, C.2
Vadhan, S.P.3
-
12
-
-
33749002225
-
Expander graphs and their applications
-
Hoory, S., Linial, N., Wigderson, A.: Expander graphs and their applications. Bull. Amer. Math. Soc. 43, 439-561 (2006)
-
(2006)
Bull. Amer. Math. Soc.
, vol.43
, pp. 439-561
-
-
Hoory, S.1
Linial, N.2
Wigderson, A.3
-
13
-
-
4544231738
-
-
STOC
-
Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Batch codes and their applica-tions. In: STOC 2004, pp. 262-271 (2004)
-
(2004)
Batch Codes and Their Applications
, vol.2004
, pp. 262-271
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
14
-
-
57049124387
-
Cryptography with constant computational overhead
-
Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Cryptography with constant computational overhead. In: STOC 2008, pp. 433-442 (2008)
-
(2008)
STOC
, vol.2008
, pp. 433-442
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
15
-
-
84945135059
-
Cryptographic counters and applications to electronic voting
-
Pfitzmann, B. (ed.) Springer, Heidelberg
-
Katz, J., Myers, S., Ostrovsky, R.: Cryptographic counters and applications to electronic voting. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 78-92. Springer, Heidelberg (2001)
-
(2001)
EUROCRYPT 2001. LNCS
, vol.2045
, pp. 78-92
-
-
Katz, J.1
Myers, S.2
Ostrovsky, R.3
-
17
-
-
51849159112
-
Communication complexity in algebraic two-party protocols
-
Wagner, D. (ed.) Springer, Heidelberg
-
Ostrovsky, R., Skeith, W.E.: Communication complexity in algebraic two-party protocols. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 379-396. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008. LNCS
, vol.5157
, pp. 379-396
-
-
Ostrovsky, R.1
Skeith, W.E.2
-
18
-
-
84957080948
-
A simple publicly verifiable secret sharing scheme and its ap-plication to electronic
-
Wiener, M. (ed.) Springer, Heidelberg
-
Schoenmakers, B.: A simple publicly verifiable secret sharing scheme and its ap-plication to electronic. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 148-164. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999. LNCS
, vol.1666
, pp. 148-164
-
-
Schoenmakers, B.1
-
20
-
-
34248175874
-
Lossless condensers, unbalanced ex-panders, and extractors
-
Ta-Shma, A., Umans, C., Zuckerman, D.: Lossless condensers, unbalanced ex-panders, and extractors. Combinatorica 27(2), 213-240 (2007)
-
(2007)
Combinatorica
, vol.27
, Issue.2
, pp. 213-240
-
-
Ta-Shma, A.1
Umans, C.2
Zuckerman, D.3
-
21
-
-
0020312165
-
Protocols for secure computations (extended abstract)
-
Yao, A.C.-C.: Protocols for secure computations (extended abstract). In: FOCS 1982, pp. 160-164 (1982)
-
(1982)
FOCS
, vol.1982
, pp. 160-164
-
-
Yao, A.C.-C.1
|