-
1
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
Advances in Cryptology - Eurocrypt 2001, Springer
-
W. Aiello, Y. Ishai, and O. Reingold. Priced oblivious transfer: How to sell digital goods. In Advances in Cryptology - Eurocrypt 2001, volume 2045 of LNCS, pages 119-135. Springer, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 119-135
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
-
4
-
-
24144488603
-
Keyword search and oblivious pseudorandom functions
-
2nd Theory of Cryptography Conference, Springer
-
M. J. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword search and oblivious pseudorandom functions. In 2nd Theory of Cryptography Conference, volume 3378 of LNCS, pages 303-324. Springer, 2005.
-
(2005)
LNCS
, vol.3378
, pp. 303-324
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
5
-
-
70350370031
-
Practical private DNA string searching and matching through efficient oblivious automata evaluation
-
Data and Applications Security, Springer
-
K. Frikken. Practical private DNA string searching and matching through efficient oblivious automata evaluation. In Data and Applications Security, volume 5645 of LNCS, pages 81-94. Springer, 2009.
-
(2009)
LNCS
, vol.5645
, pp. 81-94
-
-
Frikken, K.1
-
6
-
-
78650035406
-
Text search protocols with simulation based security
-
13th Intl. Conference on Theory and Practice of Public Key Cryptography (PKC 2010), Springer
-
R. Gennaro, C. Hazay, and J. S. Sorensen. Text search protocols with simulation based security. In 13th Intl. Conference on Theory and Practice of Public Key Cryptography (PKC 2010), volume 6056 of LNCS, pages 332-350. Springer, 2010.
-
(2010)
LNCS
, vol.6056
, pp. 332-350
-
-
Gennaro, R.1
Hazay, C.2
Sorensen, J.S.3
-
8
-
-
0023545076
-
How to play any mental game, or a completeness theorem for protocols with honest majority
-
ACM Press
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game, or a completeness theorem for protocols with honest majority. In 19th Annual ACM Symposium on Theory of Computing (STOC), pages 218-229. ACM Press, 1987.
-
(1987)
19th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
9
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
5th Theory of Cryptography Conference - TCC 2008, Springer
-
C. Hazay and Y. Lindell. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In 5th Theory of Cryptography Conference - TCC 2008, volume 4948 of LNCS, pages 155-175. Springer, 2008.
-
LNCS
, vol.4948
, Issue.2008
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
10
-
-
38049136533
-
Efficient two-party secure computation on committed inputs
-
Advances in Cryptology - Eurocrypt 2007, Springer
-
S. Jarecki and V. Shmatikov. Efficient two-party secure computation on committed inputs. In Advances in Cryptology - Eurocrypt 2007, volume 4515 of LNCS, pages 97-114. Springer, 2007.
-
(2007)
LNCS
, vol.4515
, pp. 97-114
-
-
Jarecki, S.1
Shmatikov, V.2
-
12
-
-
33745160750
-
Privacy-preserving set operations
-
Advances in Cryptology - Crypto 2005, Springer
-
L. Kissner and D. X. Song. Privacy-preserving set operations. In Advances in Cryptology - Crypto 2005, volume 3621 of LNCS, pages 241-257. Springer, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.X.2
-
13
-
-
43149086402
-
Efficient fully-simulatable oblivious transfer
-
Cryptographers' Track - RSA 2008, Springer
-
A. Lindell. Efficient fully-simulatable oblivious transfer. In Cryptographers' Track - RSA 2008, volume 4964 of LNCS, pages 52-70. Springer, 2008.
-
(2008)
LNCS
, vol.4964
, pp. 52-70
-
-
Lindell, A.1
-
14
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Advances in Cryptology - Eurocrypt 2007, Springer
-
Y. Lindell and B. Pinkas. An efficient protocol for secure two-party computation in the presence of malicious adversaries. In Advances in Cryptology - Eurocrypt 2007, volume 4515 of LNCS, pages 52-78. Springer, 2007.
-
(2007)
LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
15
-
-
52149120767
-
Implementing two-party computation efficiently with security against malicious adversaries
-
6th Intl. Conf. on Security and Cryptography for Networks (SCN '08), Springer
-
Y. Lindell, B. Pinkas, and N. Smart. Implementing two-party computation efficiently with security against malicious adversaries. In 6th Intl. Conf. on Security and Cryptography for Networks (SCN '08), volume 5229 of LNCS, pages 2-20. Springer, 2008.
-
(2008)
LNCS
, vol.5229
, pp. 2-20
-
-
Lindell, Y.1
Pinkas, B.2
Smart, N.3
-
16
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
USENIX Association
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay - a secure two-party computation system. In Proc. 13th USENIX Security Symposium, pages 287-302. USENIX Association, 2004.
-
(2004)
Proc. 13th USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
17
-
-
22044454088
-
Computationally secure oblivious transfer
-
M. Naor and B. Pinkas. Computationally secure oblivious transfer. J. Cryptology, 18(1):1-35, 2005.
-
(2005)
J. Cryptology
, vol.18
, Issue.1
, pp. 1-35
-
-
Naor, M.1
Pinkas, B.2
-
18
-
-
68849099052
-
Practical secure evaluation of semi-private functions
-
Conf. on Applied Cryptography and Network Security, Springer
-
A. Paus, A.-R. Sadeghi, and T. Schneider. Practical secure evaluation of semi-private functions. In Conf. on Applied Cryptography and Network Security, volume 5536 of LNCS, pages 89-106. Springer, 2009.
-
(2009)
LNCS
, vol.5536
, pp. 89-106
-
-
Paus, A.1
Sadeghi, A.-R.2
Schneider, T.3
-
19
-
-
72449131818
-
Secure two-party computation is practical
-
Advances in Cryptology - Asiacrypt 2009, Springer
-
B. Pinkas, T. Schneider, N. Smart, and S. Williams. Secure two-party computation is practical. In Advances in Cryptology - Asiacrypt 2009, volume 5912 of LNCS, pages 250-267. Springer, 2009.
-
(2009)
LNCS
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.3
Williams, S.4
|