-
1
-
-
79957971446
-
Key-dependent message security: Generic amplification and completeness
-
Paterson, K. G. ed., LNCS, Springer, Heidelberg
-
Applebaum, B.: Key-dependent message security: Generic amplification and completeness. In: Paterson, K. G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 527-546. Springer, Heidelberg (2011)
-
(2011)
EUROCRYPT 2011
, vol.6632
, pp. 527-546
-
-
Applebaum, B.1
-
2
-
-
70350342511
-
Fast cryptographic primitives and circular-secure encryption based on hard learning problems
-
Halevi, S. ed., LNCS, Springer, Heidelberg
-
Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009
, vol.5677
, pp. 595-618
-
-
Applebaum, B.1
Cash, D.2
Peikert, C.3
Sahai, A.4
-
3
-
-
33745306666
-
Computationally private randomizing polynomials and their applications
-
DOI 10.1007/s00037-006-0211-8
-
Applebaum, B., Ishai, Y., Kushilevitz, E.: Computationally private randomizing polynomials and their applications. Journal of Computional Complexity 15(2), 115-162 (2006) (Pubitemid 43938398)
-
(2006)
Computational Complexity
, vol.15
, Issue.2
, pp. 115-162
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
5
-
-
79956328633
-
Cryptography by cellular automata or how fast can complexity emerge in nature?
-
Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography by cellular automata or how fast can complexity emerge in nature? In: ICS 2010(2010)
-
(2010)
ICS 2010
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
6
-
-
77955319555
-
From secrecy to soundness: Efficient verification via secure computation
-
Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P. G. eds., LNCS, Springer, Heidelberg
-
Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: Efficient verification via secure computation. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P. G. (eds.) ICALP 2010. LNCS, vol. 6198, pp. 152-163. Springer, Heidelberg (2010); draft of full version available at the authors home page
-
(2010)
ICALP 2010
, vol.6198
, pp. 152-163
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
7
-
-
77954643565
-
Bounded key-dependent message security
-
Gilbert, H. ed., LNCS, Springer, Heidelberg
-
Barak, B., Haitner, I., Hofheinz, D., Ishai, Y.: Bounded key-dependent message security. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 423-444. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010
, vol.6110
, pp. 423-444
-
-
Barak, B.1
Haitner, I.2
Hofheinz, D.3
Ishai, Y.4
-
8
-
-
77954739043
-
The round complexity of secure protocols (extended abstract)
-
Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: STOC 1990(1990)
-
(1990)
STOC 1990
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
9
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: STOC 1988(1988)
-
(1988)
STOC 1988
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
10
-
-
35248822352
-
Encryption-scheme security in the presence of key-dependent messages
-
Nyberg, K., Heys, H. M. eds., LNCS, Springer, Heidelberg
-
Black, J., Rogaway, P., Shrimpton, T.: Encryption-scheme security in the presence of key-dependent messages. In: Nyberg, K., Heys, H. M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 62-75. Springer, Heidelberg (2003)
-
(2003)
SAC 2002
, vol.2595
, pp. 62-75
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
11
-
-
51849118137
-
Circular-secure encryption from decision diffie-hellman
-
Wagner, D. ed., LNCS, Springer, Heidelberg
-
Boneh, D., Halevi, S., Hamburg, M., Ostrovsky, R.: Circular-secure encryption from decision diffie-hellman. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 108-125. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008
, vol.5157
, pp. 108-125
-
-
Boneh, D.1
Halevi, S.2
Hamburg, M.3
Ostrovsky, R.4
-
12
-
-
77957010426
-
Circular and leakage resilient public-key encryption under subgroup indistinguishability (or: Quadratic residuosity strikes back)
-
Rabin, T. ed., LNCS, Springer, Heidelberg
-
Brakerski, Z., Goldwasser, S.: Circular and leakage resilient public-key encryption under subgroup indistinguishability (or: Quadratic residuosity strikes back). In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 1-20. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010
, vol.6223
, pp. 1-20
-
-
Brakerski, Z.1
Goldwasser, S.2
-
13
-
-
79953214912
-
Black-Box Circular-secure encryption beyond affine functions
-
Ishai, Y. ed., LNCS, Springer, Heidelberg
-
Brakerski, Z., Goldwasser, S., Kalai, Y.: Black-Box Circular-secure encryption beyond affine functions. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 201-218. Springer, Heidelberg (2011)
-
(2011)
TCC 2011
, vol.6597
, pp. 201-218
-
-
Brakerski, Z.1
Goldwasser, S.2
Kalai, Y.3
-
14
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Pfitzmann, B. ed., LNCS, Springer, Heidelberg
-
Camenisch, J. L., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 93. Springer, Heidelberg (2001)
-
(2001)
EUROCRYPT 2001
, vol.2045
, pp. 93
-
-
Camenisch, J.L.1
Lysyanskaya, A.2
-
15
-
-
84957671573
-
Multiparty unconditionally secure protocols (extended abstract)
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: STOC 1988(1988)
-
(1988)
STOC 1988
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
16
-
-
35248883422
-
Efficient multi-party computation over rings
-
Biham, E. ed., LNCS, Springer, Heidelberg
-
Cramer, R., Fehr, S., Ishai, Y., Kushilevitz, E.: Efficient multi-party computation over rings. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 596-613. Springer, Heidelberg (2003)
-
(2003)
EUROCRYPT 2003
, vol.2656
, pp. 596-613
-
-
Cramer, R.1
Fehr, S.2
Ishai, Y.3
Kushilevitz, E.4
-
17
-
-
33749557660
-
Scalable secure multiparty computation
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Damgård, I. B., Ishai, Y.: Scalable secure multiparty computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 501-520. Springer, Heidelberg (2006) (Pubitemid 44532135)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117
, pp. 501-520
-
-
Damgard, I.1
Ishai, Y.2
-
18
-
-
79956325752
-
On Approximating the Entropy of Polynomial Mappings
-
Dvir, Z., Gutfreund, D., Rothblum, G., Vadhan, S.: On Approximating the Entropy of Polynomial Mappings. In: ICS 2011(2011)
-
(2011)
ICS 2011
-
-
Dvir, Z.1
Gutfreund, D.2
Rothblum, G.3
Vadhan, S.4
-
19
-
-
79956328170
-
A minimal model for secure computation (extended abstract)
-
Feige, U., Killian, J., Naor, M.: A minimal model for secure computation (extended abstract). In: STOC 1994(1994)
-
(1994)
STOC 1994
-
-
Feige, U.1
Killian, J.2
Naor, M.3
-
20
-
-
57049109963
-
A (de) constructive approach to program checking
-
Goldwasser, S., Gutfreund, D., Healy, A., Kaufman, T., Rothblum, G. N.: A (de) constructive approach to program checking. In: STOC 2008(2008)
-
(2008)
STOC 2008
-
-
Goldwasser, S.1
Gutfreund, D.2
Healy, A.3
Kaufman, T.4
Rothblum, G.N.5
-
21
-
-
0034507841
-
Randomizing polynomials: A new representation with applications to round-efficient secure computation
-
Ishai, Y., Kushilevitz, E.: Randomizing polynomials: A new representation with applications to round-efficient secure computation. In: FOCS 2000(2000)
-
(2000)
FOCS 2000
-
-
Ishai, Y.1
Kushilevitz, E.2
-
22
-
-
84869164571
-
Perfect constant-round secure computation via perfect randomizing polynomials
-
Widmayer, P., Triguero, F., Morales, R., Hennessy, M., Eidenbenz, S., Conejo, R. eds., LNCS, Springer, Heidelberg
-
Ishai, Y., Kushilevitz, E.: Perfect constant-round secure computation via perfect randomizing polynomials. In: Widmayer, P., Triguero, F., Morales, R., Hennessy, M., Eidenbenz, S., Conejo, R. (eds.) ICALP 2002. LNCS, vol. 2380, p. 244. Springer, Heidelberg (2002)
-
(2002)
ICALP 2002
, vol.2380
, pp. 244
-
-
Ishai, Y.1
Kushilevitz, E.2
-
23
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
Kilian, J.: Founding cryptography on oblivious transfer. In: STOC 1988(1988)
-
(1988)
STOC 1988
-
-
Kilian, J.1
-
24
-
-
0020301290
-
Theory and application of trapdoor functions
-
Yao, A. C. C.: Theory and application of trapdoor functions. In: FOCS 1982(1982)
-
(1982)
FOCS 1982
-
-
Yao, A.C.C.1
|