-
1
-
-
35048837958
-
Security and composition of multi-party cryptographic protocols
-
Canetti, R.: Security and composition of multi-party cryptographic protocols. Journal of Cryptology 13, 2000 (1998)
-
(1998)
Journal of Cryptology
, vol.13
, pp. 2000
-
-
Canetti, R.1
-
2
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. Springer, Heidelberg
-
Goldwasser, S., Levin, L.A.: Fair computation of general functions in presence of immoral majority. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 77-93. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.A.2
-
3
-
-
85029542707
-
Foundations of secure interactive computing
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Beaver, D.: Foundations of secure interactive computing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 377-391. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 377-391
-
-
Beaver, D.1
-
4
-
-
84974655726
-
Secure computation (abstract)
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Micali, S., Rogaway, P.: Secure computation (abstract). In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 392-404. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
5
-
-
0022882770
-
How to generate and exchange secrets
-
Washington, DC, USA. IEEE Computer Society, Los Alamitos
-
Yao, A.C.C.: How to generate and exchange secrets. In: SFCS 1986: Proceedings of the 27th Annual Symposium on Foundations of Computer Science, Washington, DC, USA, pp. 162-167. IEEE Computer Society, Los Alamitos (1986)
-
(1986)
SFCS 1986: Proceedings of the 27th Annual Symposium on Foundations of Computer Science
, pp. 162-167
-
-
Yao, A.C.C.1
-
6
-
-
0023545076
-
How to play any mental game
-
ACM, New York
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: STOC 1987: Proceedings of the nineteenth annual ACM symposium on Theory of computing, pp. 218-229. ACM, New York (1987)
-
(1987)
STOC 1987: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
8
-
-
0000904908
-
Fast pattern matching in strings
-
Knuth Jr., D.E., Morris, J.H., Pratt, V.R.: Fast pattern matching in strings. SIAM J. Comput. 6(2), 323-350 (1977)
-
(1977)
SIAM J. Comput.
, vol.6
, Issue.2
, pp. 323-350
-
-
Knuth Jr., D.E.1
Morris, J.H.2
Pratt, V.R.3
-
9
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
11
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 10-18
-
-
El Gamal, T.1
-
12
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Jarecki, S., Xiaomin, L.: Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 577-594. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 577-594
-
-
Jarecki, S.1
Xiaomin, L.2
-
13
-
-
57049083569
-
Privacy preserving error resilient DNA searching through oblivious automata
-
ACM, New York
-
Troncoso-Pastoriza, J.R., Katzenbeisser, S., Celik, M.: Privacy preserving error resilient dna searching through oblivious automata. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security, pp. 519-528. ACM, New York (2007)
-
(2007)
CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 519-528
-
-
Troncoso-Pastoriza, J.R.1
Katzenbeisser, S.2
Celik, M.3
-
14
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
15
-
-
72449131818
-
Secure two-party computation is practical
-
ASIACRYPT 2009, Tokyo, Japan. Springer, Heidelberg
-
Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure two-party computation is practical. In: ASIACRYPT 2009, Tokyo, Japan. LNCS, pp. 250-267. Springer, Heidelberg (2009)
-
(2009)
LNCS
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
16
-
-
38049136533
-
Efficient two-party secure computation on committed inputs
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Jarecki, S., Shmatikov, V.: Efficient two-party secure computation on committed inputs. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 97-114. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 97-114
-
-
Jarecki, S.1
Shmatikov, V.2
-
17
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239-252. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 239-252
-
-
Schnorr, C.P.1
-
18
-
-
85001025766
-
Wallet databases with observers
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
20
-
-
44449134147
-
Sub-linear zero-knowledge argument for correctness of a shuffle
-
DOI 10.1007/978-3-540-78967-3-22, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Groth, J., Ishai, Y.: Sub-linear zero-knowledge argument for correctness of a shuffle. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 379-396. Springer, Heidelberg (2008) (Pubitemid 351762840)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 379-396
-
-
Groth, J.1
Ishai, Y.2
-
21
-
-
38049040291
-
Verifiable shuffle of large size ciphertexts
-
Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
-
Groth, J., Lu, S.: Verifiable shuffle of large size ciphertexts. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 377-392. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4450
, pp. 377-392
-
-
Groth, J.1
Lu, S.2
|