-
1
-
-
79953169628
-
-
Computer Science Department Spring
-
Barak, B.: Cryptography course - Lecture notes, COS 433. Princeton University, Computer Science Department (Spring (2010), http://www.cs.princeton. edu/courses/archive/spring10/cos433
-
(2010)
Cryptography Course - Lecture Notes, COS 433
-
-
Barak, B.1
-
2
-
-
80051636706
-
Single database private information retrieval implies oblivious transfer
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Di Crescenzo, G., Malkin, T., Ostrovsky, R.: Single database private information retrieval implies oblivious transfer. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, p. 122. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 122
-
-
Di Crescenzo, G.1
Malkin, T.2
Ostrovsky, R.3
-
3
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24-43. Springer, Heidelberg (2010), http://dx.doi.org/10. 1007/978-3-642-13190-5
-
(2010)
LNCS
, vol.6110
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
4
-
-
0001368656
-
The jackknife estimate of variance
-
Efron, B., Stein, C.: The jackknife estimate of variance. The Annals of Statistics 9(3), 586-596 (1981), http://www.jstor.org/stable/2240822
-
(1981)
The Annals of Statistics
, vol.9
, Issue.3
, pp. 586-596
-
-
Efron, B.1
Stein, C.2
-
5
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985), http://dx.doi.org/10.1007/3-540- 39568-7-2
-
(1985)
LNCS
, vol.196
, pp. 10-18
-
-
El Gamal, T.1
-
7
-
-
77957005127
-
i-hop homomorphic encryption and rerandomizable yao circuits
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Gentry, C., Halevi, S., Vaikuntanathan, V.: i-hop homomorphic encryption and rerandomizable yao circuits. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 155-172. Springer, Heidelberg (2010), http://dx.doi.org/10.1007/978-3- 642-14623-7
-
(2010)
LNCS
, vol.6223
, pp. 155-172
-
-
Gentry, C.1
Halevi, S.2
Vaikuntanathan, V.3
-
8
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press, Cambridge
-
Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
9
-
-
79953226400
-
Computational complexity: A conceptual perspective
-
Goldreich, O.: Computational complexity: a conceptual perspective. SIGACT News 39(3), 35-39 (2008)
-
(2008)
SIGACT News
, vol.39
, Issue.3
, pp. 35-39
-
-
Goldreich, O.1
-
11
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM Journal on Computing 28, 12-24 (1999)
-
(1999)
SIAM Journal on Computing
, vol.28
, pp. 12-24
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
12
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
IEEE Computer Society, Los Alamitos
-
Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, FOCS 1997, p. 364. IEEE Computer Society, Los Alamitos (1997)
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, FOCS 1997
, pp. 364
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
13
-
-
0005301490
-
On data banks and privacy homomorphisms
-
Academic Press, London
-
Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169-180. Academic Press, London (1978)
-
(1978)
Foundations of Secure Computation
, pp. 169-180
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
14
-
-
79953194566
-
Homomorphic encryption: From private-key to public-key
-
Rothblum, R.: Homomorphic encryption: from private-key to public-key. Electronic Colloquium on Computational Complexity (ECCC) 17, 146 (2010), http://eccc.hpi-web.de/report/2010/146
-
(2010)
Electronic Colloquium on Computational Complexity (ECCC)
, vol.17
, pp. 146
-
-
Rothblum, R.1
|