-
1
-
-
0003415652
-
-
Addison-Wesley Publishing Company, Reading, Massachusetts
-
A. V. Aho, J. E. Hopcroft, and J. D. Ullman. The Design and Analysis of Computer Algorithms. Addison-Wesley Publishing Company, Reading, Massachusetts, 1974.
-
(1974)
The Design and Analysis of Computer Algorithms
-
-
Aho, A.V.1
Hopcroft, J.E.2
Ullman, J.D.3
-
3
-
-
77954755618
-
Oblivious RAMs without cryptogrpahic assumptions
-
L. J. Schulman, editor, ACM
-
M. Ajtai. Oblivious RAMs without cryptogrpahic assumptions. In L. J. Schulman, editor, Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010, pages 181-190. ACM, 2010.
-
(2010)
Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010
, pp. 181-190
-
-
Ajtai, M.1
-
5
-
-
77954640094
-
Protecting circuits from leakage: The computationally-bounded and noisy cases
-
H. Gilbert, editor, Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings, Springer
-
S. Faust, T. Rabin, L. Reyzin, E. Tromer, and V. Vaikuntanathan. Protecting circuits from leakage: the computationally-bounded and noisy cases. In H. Gilbert, editor, Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings, volume 6110 of Lecture Notes in Computer Science, pages 135-156. Springer, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6110
, pp. 135-156
-
-
Faust, S.1
Rabin, T.2
Reyzin, L.3
Tromer, E.4
Vaikuntanathan, V.5
-
6
-
-
0023547498
-
Towards a theory of software protection and simulation by oblivious RAMs
-
ACM
-
O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In STOC, Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, 25-27 May 1987, New York City, NY, USA, pages 182-194. ACM, 1987.
-
(1987)
STOC, Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, 25-27 May 1987, New York City, NY, USA
, pp. 182-194
-
-
Goldreich, O.1
-
7
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, 43(3):431-473, 1996.
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
8
-
-
77957009399
-
Securing computation against continuous leakage
-
T. Rabin, editor, Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings, Springer
-
S. Goldwasser and G. N. Rothblum. Securing computation against continuous leakage. In T. Rabin, editor, Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings, volume 6223 of Lecture Notes in Computer Science, pages 59-79. Springer, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6223
, pp. 59-79
-
-
Goldwasser, S.1
Rothblum, G.N.2
-
9
-
-
35248830337
-
Private circuits: Securing hardware against probing attacks
-
D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, Springer
-
Y. Ishai, A. Sahai, and D. Wagner. Private circuits: Securing hardware against probing attacks. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, volume 2729 of Lecture Notes in Computer Science, pages 463-481. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
10
-
-
35048852134
-
Physically observable cryptography
-
extended abstract In M. Naor, editor, Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, Springer
-
S. Micali and L. Reyzin. Physically observable cryptography (extended abstract). In M. Naor, editor, Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, volume 2951 of Lecture Notes in Computer Science, pages 278-296. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
11
-
-
0025154732
-
Efficient computation on oblivious RAMs
-
ACM
-
R. Ostrovsky. Efficient computation on oblivious RAMs. In STOC, Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing, 14-16 May 1990, Baltimore, Maryland, USA, pages 514-523. ACM, 1990.
-
(1990)
STOC, Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing, 14-16 May 1990, Baltimore, Maryland, USA
, pp. 514-523
-
-
Ostrovsky, R.1
-
13
-
-
0018456413
-
Relations among complexity measures
-
N. Pippenger and M. J. Fischer. Relations among complexity measures. J. ACM, 26(2):361-381, 1979.
-
(1979)
J. ACM
, vol.26
, Issue.2
, pp. 361-381
-
-
Pippenger, N.1
Fischer, M.J.2
|