-
1
-
-
77954755618
-
Oblivious rams without cryptogrpahic assumptions
-
M. Ajtai. Oblivious rams without cryptogrpahic assumptions. In STOC, 2010.
-
(2010)
STOC
-
-
Ajtai, M.1
-
2
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computations. In STOC, 1988.
-
(1988)
STOC
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
79959899156
-
Cache-oblivious data structures and algorithms for undirected breadth-first search and shortest paths
-
G. Brodal, R. Fagerberg, U. Meyer, and N. Zeh. Cache-oblivious data structures and algorithms for undirected breadth-first search and shortest paths. In SWAT, 2004.
-
(2004)
SWAT
-
-
Brodal, G.1
Fagerberg, R.2
Meyer, U.3
Zeh, N.4
-
4
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crépeau, and I. Damgård. Multiparty unconditionally secure protocols. In STOC, 1988.
-
(1988)
STOC
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
5
-
-
33746088658
-
Multiparty computation from threshold homomorphic encryption
-
R. Cramer, I. Damgård, and J. Nielsen. Multiparty computation from threshold homomorphic encryption. In Eurocrypt, 2001.
-
(2001)
Eurocrypt
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.3
-
7
-
-
33645595606
-
Universally composable efficient multiparty computation from threshold homomorphic encryption
-
I. Damgård and J. Nielsen. Universally composable efficient multiparty computation from threshold homomorphic encryption. In Crypto, 2003.
-
(2003)
Crypto
-
-
Damgård, I.1
Nielsen, J.2
-
9
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious rams. J. ACM, 43(3):431-473, 1996.
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
10
-
-
67650152160
-
Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
-
T. Nishide and K. Ohta. Multiparty computation for interval, equality, and comparison without bit-decomposition protocol. In PKC, 2007.
-
(2007)
PKC
-
-
Nishide, T.1
Ohta, K.2
-
11
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Eurocrypt, 1999.
-
(1999)
Eurocrypt
-
-
Paillier, P.1
-
13
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
14
-
-
79959864414
-
Secure datastructures based on multiparty computation
-
T. Toft. Secure datastructures based on multiparty computation. Cryptology ePrint Archive, Report 2011/081, 2011. http://eprint.iacr.org/.
-
(2011)
Cryptology ePrint Archive, Report 2011/081
-
-
Toft, T.1
-
15
-
-
0020312165
-
Protocols for secure computations
-
extended abstract
-
A. Yao. Protocols for secure computations (extended abstract). In FOCS, 1982.
-
(1982)
FOCS
-
-
Yao, A.1
|