-
1
-
-
85096105190
-
-
Technical report, Microprocessor Standards Committee of the IEEE Computer Society
-
IEEE Standard for Floating-Point Arithmetic. Technical report, Microprocessor Standards Committee of the IEEE Computer Society, 2008.
-
(2008)
IEEE Standard for Floating-Point Arithmetic
-
-
-
2
-
-
70350399649
-
Secure evaluation of private linear branching programs with medical applications
-
Berlin, Heidelberg, Springer-Verlag
-
M. Barni, P. Failla, V. Kolesnikov, R. Lazzeretti, A.-R. Sadeghi, and T. Schneider. Secure evaluation of private linear branching programs with medical applications. In Proceedings of the 14th European conference on Research in computer security, ESORICS'09, pages 424-439, Berlin, Heidelberg, 2009. Springer-Verlag.
-
(2009)
Proceedings of the 14th European Conference on Research in Computer Security, ESORICS'09
, pp. 424-439
-
-
Barni, M.1
Failla, P.2
Kolesnikov, V.3
Lazzeretti, R.4
Sadeghi, A.-R.5
Schneider, T.6
-
3
-
-
77955328311
-
Secure computation with fixed-point numbers
-
R. Sion, editor, Financial Cryptography and Data Security, Springer Berlin / Heidelberg
-
O. Catrina and A. Saxena. Secure computation with fixed-point numbers. In R. Sion, editor, Financial Cryptography and Data Security, volume 6052 of Lecture Notes in Computer Science, pages 35-50. Springer Berlin / Heidelberg, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6052
, pp. 35-50
-
-
Catrina, O.1
Saxena, A.2
-
4
-
-
69949163699
-
Privacy-preserving face recognition
-
Berlin, Heidelberg, Springer-Verlag
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft. Privacy-preserving face recognition. In Proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS '09, pages 235-253, Berlin, Heidelberg, 2009. Springer-Verlag.
-
(2009)
Proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS '09
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
5
-
-
80054783916
-
Secure computations on real-valued signals
-
IEEE Press
-
M. Franz, B. Deiseroth, K. Hamacher, S. Jha, S. Katzenbeisser, and H. Schröder. Secure computations on real-valued signals. In IEEE Workshop on Information Forensics and Security (WIFS'10). IEEE Press, 2010.
-
(2010)
IEEE Workshop on Information Forensics and Security (WIFS'10)
-
-
Franz, M.1
Deiseroth, B.2
Hamacher, K.3
Jha, S.4
Katzenbeisser, S.5
Schröder, H.6
-
6
-
-
80054790897
-
Towards secure bioinformatics services
-
Springer-Verlag
-
M. Franz, S. Katzenbeisser, B. Deiseroth, K. Hamacher, and S. Jha. Towards secure bioinformatics services. In Proceedings of the 15th International Conference on Financial Cryptography, FC'11, Berlin, Heidelberg, 2011. Springer-Verlag.
-
Proceedings of the 15th International Conference on Financial Cryptography, FC'11, Berlin, Heidelberg, 2011
-
-
Franz, M.1
Katzenbeisser, S.2
Deiseroth, B.3
Hamacher, K.4
Jha, S.5
-
7
-
-
78649820323
-
Basic Applications
-
Cambridge University Press, New York, NY, USA
-
O. Goldreich. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, New York, NY, USA, 2004.
-
(2004)
Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
8
-
-
78649992236
-
-
Cryptology ePrint Archive, Report 2010/365
-
W. Henecka, S. Kögl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg. Tasty: Tool for automating secure two-party computations. Cryptology ePrint Archive, Report 2010/365, 2010.
-
(2010)
Tasty: Tool for Automating Secure Two-party Computations
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
9
-
-
71549170830
-
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
-
J. A. Garay, A. Miyaji, and A. Otsuka, editors, Springer Berlin Heidelberg, Berlin, Heidelberg
-
V. Kolesnikov, A.-R. Sadeghi, and T. Schneider. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. In J. A. Garay, A. Miyaji, and A. Otsuka, editors, Cryptology and Network Security, volume 5888. Springer Berlin Heidelberg, Berlin, Heidelberg, 2009.
-
(2009)
Cryptology and Network Security
, vol.5888
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
10
-
-
49049099825
-
Improved garbled circuit: Free xor gates and applications
-
Berlin, Heidelberg, Springer-Verlag
-
V. Kolesnikov and T. Schneider. Improved garbled circuit: Free xor gates and applications. In Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II, ICALP '08, pages 486-498, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 35th International Colloquium on Automata, Languages and Programming, Part II, ICALP '08
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
12
-
-
85084163840
-
Fairplay Ů a secure two-party computation system
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay Ů a secure two-party computation system. In In USENIX Security Symposium, pages 287-302, 2004.
-
(2004)
USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
13
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Berlin, Heidelberg, Springer-Verlag
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the 17th international conference on Theory and application of cryptographic techniques, EUROCRYPT'99, pages 223-238, Berlin, Heidelberg, 1999. Springer-Verlag.
-
(1999)
Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT'99
, pp. 223-238
-
-
Paillier, P.1
-
14
-
-
72449131818
-
Secure two-party computation is practical
-
M. Matsui, editor, Advances in Cryptology U{combining double acute accent} ASIACRYPT 2009, Springer Berlin / Heidelberg
-
B. Pinkas, T. Schneider, N. Smart, and S. Williams. Secure two-party computation is practical. In M. Matsui, editor, Advances in Cryptology U{combining double acute accent} ASIACRYPT 2009, volume 5912 of Lecture Notes in Computer Science, pages 250-267. Springer Berlin / Heidelberg, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.3
Williams, S.4
-
15
-
-
0020312165
-
Protocols for secure computations
-
Washington, DC, USA, IEEE Computer Society
-
A. C. Yao. Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS '82, pages 160-164, Washington, DC, USA, 1982. IEEE Computer Society.
-
(1982)
Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS '82
, pp. 160-164
-
-
Yao, A.C.1
|