-
1
-
-
43949083701
-
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
-
Z. Erkin, A. Piva, S. Katzenbeisser, R. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, "Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing," EURASIP J. Inform. Sec., vol. 2007, p. 17, 2007.
-
(2007)
EURASIP J. Inform. Sec.
, vol.2007
, pp. 17
-
-
Erkin, Z.1
Piva, A.2
Katzenbeisser, S.3
Lagendijk, R.4
Shokrollahi, J.5
Neven, G.6
Barni, M.7
-
2
-
-
0041783510
-
Privacy-preserving data mining
-
R. Agrawal and R. Srikant, "Privacy-preserving data mining," SIGMOD Record, vol. 29, no. 2, pp. 439-450, 2000.
-
(2000)
SIGMOD Record
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
33746437508
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas, "Privacy preserving data mining," J. Cryptology, vol. 15, no. 3, pp. 177-206, 2008.
-
(2008)
J. Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
6
-
-
49049088581
-
Experimental demonstration of a hybrid privacy-preserving recommender system
-
IEEE Computer Society
-
E. Aimeur, G. Brassard, J. Fernandez, F. Onana, and Z. Rakowski, "Experimental demonstration of a hybrid privacy-preserving recommender system," in Proc. Int. Conf. Availability, Rel. Security., 2008, pp. 161-170, IEEE Computer Society.
-
(2008)
Proc. Int. Conf. Availability, Rel. Security.
, pp. 161-170
-
-
Aimeur, E.1
Brassard, G.2
Fernandez, J.3
Onana, F.4
Rakowski, Z.5
-
7
-
-
77949846904
-
Efficient privacy-preserving classification of ECG signals
-
M. Barni, P. Failla, V. Kolesnikov, R. Lazzeretti, A.-R. Sadeghi, and T. Schneider, "Efficient privacy-preserving classification of ECG signals," in Proc. IEEE Int. Workshop Inf. Forensics Security (WIFS09), 2009, pp. 91-95.
-
(2009)
Proc. IEEE Int. Workshop Inf. Forensics Security (WIFS09)
, pp. 91-95
-
-
Barni, M.1
Failla, P.2
Kolesnikov, V.3
Lazzeretti, R.4
Sadeghi, A.-R.5
Schneider, T.6
-
8
-
-
70349967065
-
Google health: Birth of a giant
-
M. McBride, "Google health: Birth of a giant," Health Manage. Technol., vol. 29, pp. 8-10, 2008.
-
(2008)
Health Manage. Technol.
, vol.29
, pp. 8-10
-
-
McBride, M.1
-
12
-
-
85084163840
-
Fairplay-A secure two-party computation system
-
San Diego, CA, [Online]. Available
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, "Fairplay-A secure two-party computation system," in Proc. USENIX Security Symp. (Security' 04), San Diego, CA, 2004, pp. 287-302 [Online]. Available: http://www.cs.huji. ac.il/project/Fairplay
-
(2004)
Proc. USENIX Security Symp. (Security' 04)
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
13
-
-
54249097947
-
A practical universal circuit construction and secure evaluation of private functions
-
Springer, LNCS
-
V. Kolesnikov and T. Schneider, "A practical universal circuit construction and secure evaluation of private functions," in Proc. Financial Cryptography Data Security (FC'08), 2008, vol. 5143, pp. 83-97, Springer, LNCS.
-
(2008)
Proc. Financial Cryptography Data Security (FC'08)
, vol.5143
, pp. 83-97
-
-
Kolesnikov, V.1
Schneider, T.2
-
14
-
-
67049095583
-
Generalized universal circuits for secure evaluation of private functions with application to data classification
-
Springer, LNCS
-
A.-R. Sadeghi and T. Schneider, "Generalized universal circuits for secure evaluation of private functions with application to data classification," in Proc. Int. Conf. Inf. Security Cryptology (ICISC'08), 2008, vol. 5461, pp. 336-353, Springer, LNCS.
-
(2008)
Proc. Int. Conf. Inf. Security Cryptology (ICISC'08)
, vol.5461
, pp. 336-353
-
-
Sadeghi, A.-R.1
Schneider, T.2
-
15
-
-
79957470109
-
The application of autoregressive modeling in cardiac arrhythmia classification
-
New York: Springer
-
D. Ge, N. Srinivasan, and S. M. Krishnan, "The application of autoregressive modeling in cardiac arrhythmia classification," in Advances in Cardiac Signal Processing. New York: Springer, 2007, pp. 209-226.
-
(2007)
Advances in Cardiac Signal Processing
, pp. 209-226
-
-
Ge, D.1
Srinivasan, N.2
Krishnan, S.M.3
-
16
-
-
3042565159
-
Cardiac arrhythmia classification using autoregressive modeling
-
D. F. Ge, N. Srinivasan, and S.M. Krishnan, "Cardiac arrhythmia classification using autoregressive modeling," BioMed. Eng. OnLine, vol. 1, no. 1, pp. 5-5, 2002.
-
(2002)
BioMed. Eng. OnLine
, vol.1
, Issue.1
, pp. 5-5
-
-
Ge, D.F.1
Srinivasan, N.2
Krishnan, S.M.3
-
17
-
-
70350399649
-
Secure evaluation of private linear branching programs with medical applications
-
Springer, LNCS
-
M. Barni, P. Failla, V. Kolesnikov, R. Lazzeretti, A.-R. Sadeghi, and T. Schneider, "Secure evaluation of private linear branching programs with medical applications," in Proc. Eur. Symp. Res. Comput. Security (ESORICS'09), 2009, vol. 5789, pp. 424-439, Springer, LNCS.
-
(2009)
Proc. Eur. Symp. Res. Comput. Security (ESORICS'09)
, vol.5789
, pp. 424-439
-
-
Barni, M.1
Failla, P.2
Kolesnikov, V.3
Lazzeretti, R.4
Sadeghi, A.-R.5
Schneider, T.6
-
18
-
-
71549170830
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
Springer, LNCS
-
V. Kolesnikov, A.-R. Sadeghi, and T. Schneider, "Improved garbled circuit building blocks and applications to auctions and computing minima," in Cryptology Network Security (CANS'09), 2009, vol. 5888, pp. 1-20, Springer, LNCS.
-
(2009)
Cryptology Network Security (CANS'09)
, vol.5888
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
19
-
-
72449131818
-
Secure twoparty computation is practical
-
Springer, LNCS
-
B. Pinkas, T. Schneider, N. P. Smart, and S. C.Williams, "Secure twoparty computation is practical," in Proc. Adv. Cryptology (ASIACRYPT 2009), 2009, vol. 5912, pp. 250-267, Springer, LNCS.
-
(2009)
Proc. Adv. Cryptology (ASIACRYPT 2009)
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
21
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer, LNCS
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Adv. Cryptology (EUROCRYPT'99), 1999, vol. 1592, pp. 223-238, Springer, LNCS.
-
(1999)
Proc. Adv. Cryptology (EUROCRYPT'99)
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
22
-
-
0030270734
-
Generalized feature extraction for time-varying autoregressive models
-
PII S1053587X96071462
-
J. Rajan and P. Rayner, "Generalized feature extraction for time-varying autoregressive models," IEEE Trans. Signal Process., vol. 44, no. 10, pp. 2498-2507, Oct. 1996. (Pubitemid 126776552)
-
(1996)
IEEE Transactions on Signal Processing
, vol.44
, Issue.10
, pp. 2498-2507
-
-
Rajan, J.J.1
Rayner, P.J.W.2
-
24
-
-
0029351289
-
Artificial neural networks for medical classification decisions
-
M. Kattan and R. Beck, "Artificial neural networks for medical classification decisions," Archives Pathology Lab. Medicine (1976), vol. 119, no. 8, pp. 672-677, 1995.
-
(1995)
Archives Pathology Lab. Medicine (1976)
, vol.119
, Issue.8
, pp. 672-677
-
-
Kattan, M.1
Beck, R.2
-
25
-
-
84953718312
-
Application of shunting inhibitory artificial neural networks to medical diagnosis
-
Perth, WA
-
G. Arulampalam and A. Bouzerdoum, "Application of shunting inhibitory artificial neural networks to medical diagnosis," in Proc. ANZIIS 2001. Proc. 7th Australian New Zealand Intelligent Inf. Syst. Conf., Perth, WA, 2001, pp. 89-94.
-
(2001)
Proc. ANZIIS 2001. Proc. 7th Australian New Zealand Intelligent Inf. Syst. Conf.
, pp. 89-94
-
-
Arulampalam, G.1
Bouzerdoum, A.2
-
26
-
-
14844283547
-
Physiobank, physiotoolkit, and physionet: Components of a new research resource for complex physiologic signals
-
Jun.
-
A. L. Goldberger, L. A. N. Amaral, L. Glass, J. M. Hausdorff, P. C. Ivanov, R. G.Mark, J. E.Mietus, G. B.Moody, C.-K. Peng, and H. E. Stanley, "Physiobank, physiotoolkit, and physionet: Components of a new research resource for complex physiologic signals," Circulation, vol. 101, no. 23, pp. e215-e220, Jun. 2000.
-
(2000)
Circulation
, vol.101
, Issue.23
-
-
Goldberger, A.L.1
Amaral, L.A.N.2
Glass, L.3
Hausdorff, J.M.4
Ivanov, P.C.5
Mark, R.G.6
Mietus, J.E.7
Moody, G.B.8
Peng, C.-K.9
Stanley, H.E.10
-
27
-
-
0028543366
-
Training feedforward networks with the marquardt algorithm
-
Nov.
-
M. Hagan and M. Menhaj, "Training feedforward networks with the marquardt algorithm," IEEE Trans. Neural Netw., vol. 5, no. 6, pp. 989-993, Nov. 1994.
-
(1994)
IEEE Trans. Neural Netw.
, vol.5
, Issue.6
, pp. 989-993
-
-
Hagan, M.1
Menhaj, M.2
-
28
-
-
78049357399
-
Secure multiparty computation for privacypreserving data mining
-
Y. Lindell and B. Pinkas, "Secure multiparty computation for privacypreserving data mining," J. Privacy Confidentiality, vol. 1, no. 1, pp. 59-98, 2009.
-
(2009)
J. Privacy Confidentiality
, vol.1
, Issue.1
, pp. 59-98
-
-
Lindell, Y.1
Pinkas, B.2
-
29
-
-
84883898504
-
Privacy preserving auctions and mechanism design
-
M. Naor, B. Pinkas, and R. Sumner, "Privacy preserving auctions and mechanism design," in Proc. ACM Conf. Electron. Commerce, 1999, pp. 129-139.
-
(1999)
Proc. ACM Conf. Electron. Commerce
, pp. 129-139
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
30
-
-
69949163699
-
Privacy-preserving face recognition
-
Springer, LNCS
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft, "Privacy-preserving face recognition," in Proc. Privacy Enhancing Technol. (PET'09), 2009, vol. 5672, pp. 235-253, Springer, LNCS.
-
(2009)
Proc. Privacy Enhancing Technol. (PET'09)
, vol.5672
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
31
-
-
77954610725
-
Efficient privacypreserving face recognition
-
Springer, LNCS
-
A.-R. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient privacypreserving face recognition," in 12th Int. Conf. Inf. Security Cryptology (ICISC'09), 2009, vol. 5984, pp. 229-244, Springer, LNCS.
-
(2009)
12th Int. Conf. Inf. Security Cryptology (ICISC'09)
, vol.5984
, pp. 229-244
-
-
Sadeghi, A.-R.1
Schneider, T.2
Wehrenberg, I.3
-
32
-
-
77955178939
-
SCiFI-A system for secure face identification
-
M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich, "SCiFI-A system for secure face identification," in IEEE Symp. Security & Privacy (S&P'10)., 2010, pp. 239-254.
-
(2010)
IEEE Symp. Security & Privacy (S&P'10).
, pp. 239-254
-
-
Osadchy, M.1
Pinkas, B.2
Jarrous, A.3
Moskovich, B.4
-
33
-
-
0003979335
-
-
Cambridge Univ. Press 2 [Online]. Available
-
O. Goldreich, Foundations of cryptography Cambridge Univ. Press, 2004, vol. 2 [Online]. Available: http://www.wisdom.weizmann.ac.il/ oded/foc-vol2.html
-
(2004)
Foundations of cryptography
-
-
Goldreich, O.1
-
34
-
-
52149120767
-
Implementing two-party computation efficiently with security against malicious adversaries
-
Springer, LNCS
-
Y. Lindell, B. Pinkas, and N. Smart, "Implementing two-party computation efficiently with security against malicious adversaries," in Proc. Security Cryptography For Networks (SCN'08), 2008, vol. 5229, pp. 2-20, Springer, LNCS.
-
(2008)
Proc. Security Cryptography For Networks (SCN'08)
, vol.5229
, pp. 2-20
-
-
Lindell, Y.1
Pinkas, B.2
Smart, N.3
-
35
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
Public Key Cryptography
-
I. Damgård and M. Jurik, "A generalisation, a simplification and some applications of paillier's probabilistic public-key system," in Proc. Public-Key Cryptography (PKC'01), 2001, pp. 119-136, Springer, LNCS. (Pubitemid 33232937)
-
(2001)
Proc. Public-Key Cryptography (PKC'01)
, Issue.1992
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
36
-
-
77249117753
-
Composite signal representation for fast and storage-efficient processing of encrypted signals
-
Mar.
-
T. Bianchi, A. Piva, and M. Barni, "Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180-187, Mar. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.1
, pp. 180-187
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
37
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
D. Boneh, E.-J. Goh, and K. Nissim, "Evaluating 2-DNF formulas on ciphertexts," in Proc. Theor. Cryptography (TCC'05), 2005, vol. 3378, pp. 325-341, Springer, LNCS. (Pubitemid 41231172)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
38
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. ACM Symp. Theor. Comput. (STOC'09)., 2009, pp. 169-178.
-
(2009)
Proc. ACM Symp. Theor. Comput. (STOC'09).
, pp. 169-178
-
-
Gentry, C.1
-
39
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
Springer, LNCS
-
M. Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully homomorphic encryption over the integers," in Proc. Adv. Cryptology (EUROCRYPT' 10), 2010, vol. 6110, pp. 24-43, Springer, LNCS.
-
(2010)
Proc. Adv. Cryptology (EUROCRYPT' 10)
, vol.6110
, pp. 24-43
-
-
Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
40
-
-
79955532534
-
Fully homomorphic encryption with relatively small key and ciphertext sizes
-
Springer, LNCS
-
N. P. Smart and F. Vercauteren, "Fully homomorphic encryption with relatively small key and ciphertext sizes," in Proc. Public Key Cryptography (PKC'10), 2010, vol. 6056, pp. 420-443, Springer, LNCS.
-
(2010)
Proc. Public Key Cryptography (PKC'10)
, vol.6056
, pp. 420-443
-
-
Smart, N.P.1
Vercauteren, F.2
-
41
-
-
64249101946
-
A proof of Yao's protocol for secure twoparty computation
-
[Online]. Available
-
Y. Lindell and B. Pinkas, "A proof of Yao's protocol for secure twoparty computation," J. Cryptology, vol. 22, no. 2, pp. 161-188, 2009 [Online]. Available: http://eprint.iacr.org/2004/175
-
(2009)
J. Cryptology
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
43
-
-
36949019777
-
Oblivious neural network computing from homomorphic encryption
-
C. Orlandi, A. Piva, and M. Barni, "Oblivious neural network computing from homomorphic encryption," EURASIP J. Inform. Sec., vol. 2007, p. 11, 2007.
-
(2007)
EURASIP J. Inform. Sec.
, vol.2007
, pp. 11
-
-
Orlandi, C.1
Piva, A.2
Barni, M.3
-
44
-
-
71549138933
-
Privacy-preserving remote diagnostics
-
J. Brickell, D. E. Porter, V. Shmatikov, and E. Witchel, "Privacy-preserving remote diagnostics," in Proc. ACM Comput. Commun. Security (ACM CCS'07)., 2007, pp. 498-507.
-
(2007)
Proc. ACM Comput. Commun. Security (ACM CCS'07).
, pp. 498-507
-
-
Brickell, J.1
Porter, D.E.2
Shmatikov, V.3
Witchel, E.4
-
45
-
-
78649992236
-
TASTY: Tool for automating secure two-party computations
-
W. Henecka, S. Kögl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg, "TASTY: Tool for automating secure two-party computations," in Proc. ACM Comput. Commun. Security (CCS'10)., 2010, pp. 451-462.
-
(2010)
Proc. ACM Comput. Commun. Security (CCS'10).
, pp. 451-462
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
46
-
-
78049349651
-
Garbled circuits for leakage-resilience: Hardware implementation and evaluation of one-time programs
-
Springer, LNCS
-
K. Järvinen, V. Kolesnikov, A.-R. Sadeghi, and T. Schneider, "Garbled circuits for leakage-resilience: Hardware implementation and evaluation of one-time programs," in Proc. Cryptographic Hardware Embedded Syst. (CHES'10), 2010, vol. 6225, pp. 383-397, Springer, LNCS.
-
(2010)
Proc. Cryptographic Hardware Embedded Syst. (CHES'10)
, vol.6225
, pp. 383-397
-
-
Järvinen, K.1
Kolesnikov, V.2
Sadeghi, A.-R.3
Schneider, T.4
-
47
-
-
77955312868
-
Embedded SFE: Offloading server and network using hardware tokens
-
Springer, LNCS
-
K. Järvinen, V. Kolesnikov, A.-R. Sadeghi, and T. Schneider, "Embedded SFE: Offloading server and network using hardware tokens," in Proc. Financial Cryptography Data Security (FC'10), 2010, vol. 6052, pp. 207-221, Springer, LNCS.
-
(2010)
Proc. Financial Cryptography Data Security (FC'10)
, vol.6052
, pp. 207-221
-
-
Järvinen, K.1
Kolesnikov, V.2
Sadeghi, A.-R.3
Schneider, T.4
-
48
-
-
77954749319
-
Token-based cloud computing-Secure outsourcing of data and arbitrary computations with lower latency
-
Springer, LNCS
-
A.-R. Sadeghi, T. Schneider, and M. Winandy, "Token-based cloud computing-Secure outsourcing of data and arbitrary computations with lower latency," in Proc. Trust Trustworthy Comput. (TRUST'10)-Workshop Trust Cloud, 2010, vol. 6101, pp. 417-429, Springer, LNCS.
-
(2010)
Proc. Trust Trustworthy Comput. (TRUST'10)-Workshop Trust Cloud
, vol.6101
, pp. 417-429
-
-
Sadeghi, A.-R.1
Schneider, T.2
Winandy, M.3
-
49
-
-
77957001848
-
Additively homomorphic encryption with d-operand multiplications
-
Springer, LNCS, Santa Barbara, CA
-
C. Aguilar, P. Gaborit, and J. Herranz, "Additively homomorphic encryption with d-operand multiplications," in Adv. Cryptology (CRYPTO'10), Santa Barbara, CA, 2010, pp. 138-154, Springer, LNCS.
-
(2010)
Adv. Cryptology (CRYPTO'10)
, pp. 138-154
-
-
Aguilar, C.1
Gaborit, P.2
Herranz, J.3
-
50
-
-
33845259521
-
-
NIST U.S. National Institute of Standards and Technology Federal information processing standards (FIPS 180-2). Aug. [Online]. Available
-
NIST, U.S. National Institute of Standards and Technology, Federal information processing standards (FIPS 180-2). Announcing the secure hash standard Aug. 2002 [Online]. Available: http://csrc.nist.gov/publications/ fips/fips180-2/fips-180-2.pdf
-
(2002)
Announcing the secure hash standard
-
-
-
51
-
-
84928743703
-
Precomputing oblivious transfer
-
Springer, LNCS
-
D. Beaver, "Precomputing oblivious transfer," in Proc. Adv. Cryptology (CRYPTO'95), 1995, vol. 963, pp. 97-109, Springer, LNCS.
-
(1995)
Proc. Adv. Cryptology (CRYPTO'95)
, vol.963
, pp. 97-109
-
-
Beaver, D.1
-
52
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Y. Ishai, J. Kilian, K. Nissim, and E. Petrank, "Extending oblivious transfers efficiently," in Proc. Adv. Cryptology (CRYPTO'03), 2003, vol. 2729, pp. 145-161, Springer, LNCS. (Pubitemid 137636940)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
53
-
-
64049119146
-
Efficient oblivious transfer protocols
-
Society for Industrial and Applied Mathematics
-
M. Naor and B. Pinkas, "Efficient oblivious transfer protocols," in Proc. ACM-SIAM Symp. Discrete Algorithms (SODA'01), 2001, pp. 448-457, Society for Industrial and Applied Mathematics.
-
(2001)
Proc. ACM-SIAM Symp. Discrete Algorithms (SODA'01)
, pp. 448-457
-
-
Naor, M.1
Pinkas, B.2
-
54
-
-
0346707588
-
On the multiplicative complexity of boolean functions over the basis
-
J. Boyar, R. Peralta, andD. Pochuev, "On the multiplicative complexity of boolean functions over the basis ," Theor. Comput. Sci., vol. 235, no. 1, pp. 43-57, 2000.
-
(2000)
Theor. Comput. Sci.
, vol.235
, Issue.1
, pp. 43-57
-
-
Boyar, J.1
Peralta, R.2
Pochuev, D.3
-
55
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
Springer, LNCS
-
V. Kolesnikov and T. Schneider, "Improved garbled circuit: Free XOR gates and applications," in Proc. Int. Colloquium Automata, Languages Programming (ICALP'08), 2008, vol. 5126, pp. 486-498, Springer, LNCS.
-
(2008)
Proc. Int. Colloquium Automata, Languages Programming (ICALP'08)
, vol.5126
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
|