-
1
-
-
35048875418
-
Secure computation of the k th-ranked element
-
G. Aggarwal, N. Mishra, and B. Pinkas. Secure computation of the k th-ranked element. In EUROCRYPT, pages 40-55, 2004.
-
(2004)
Eurocrypt
, pp. 40-55
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
2
-
-
20444460385
-
Private collaborative forecasting and benchmarking
-
WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society
-
M. Atallah, M. Bykova, J. Li, K. Frikken, and M. Topkara. Private collaborative forecasting and benchmarking. In Proceedings of the ACM Workshop on Privacy in an Electronic Society, pages 103-114, 2004. (Pubitemid 40821100)
-
(2004)
WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society
, pp. 103-114
-
-
Atallah, M.1
Bykova, M.2
Li, J.3
Frikken, K.4
Topkara, M.5
-
6
-
-
70350379222
-
Secure multiparty computation goes live
-
P. Bogetoft, D. L. Christensen, I. Damgard, M. Geisler, T. Jakobsen, M. Kroigaard, J. D. Nielsen, J. B. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach, and T. Toft. Secure multiparty computation goes live. In 13th International Conference on Financial Cryptography and Data Security, 2009.
-
(2009)
13th International Conference on Financial Cryptography and Data Security
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgard, I.3
Geisler, M.4
Jakobsen, T.5
Kroigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.11
Toft, T.12
-
10
-
-
0002626155
-
General secure multi-party computation from any linear secret sharing scheme
-
R. Cramer, I. Damgard, and U. Maurer. General secure multi-party computation from any linear secret sharing scheme. In Eurocrypt, 2000.
-
(2000)
Eurocrypt
-
-
Cramer, R.1
Damgard, I.2
Maurer, U.3
-
11
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
R. Cramer, I. Damgard, and J. Nielsen. Multiparty computation from threshold homomorphic encryption. In Proceedings of EUROCRYPT, Lecture Notes in Computer Science 2045, pages 280-299, 2001.
-
(2001)
Proceedings of EUROCRYPT, Lecture Notes in Computer Science
, vol.2045
, pp. 280-299
-
-
Cramer, R.1
Damgard, I.2
Nielsen, J.3
-
12
-
-
84867553981
-
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
-
Public Key Cryptography
-
I. Damgard and M. Jurik. A generalisation, a simplification and some applications of pailliers probabilistic public-key system. In Proceedings of International Conference on Theory and Practice of Public-Key Cryptography, Lecture Notes in Computer Science 1992, pages 119-136, 2001. (Pubitemid 33232937)
-
(2001)
Lecture Notes in Computer Science
, Issue.1992
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
14
-
-
73649127310
-
Improving practical performance on secure and private collaborative linear programming
-
R. Deitos and F. Kerschbaum. Improving practical performance on secure and private collaborative linear programming. In DEXA Workshops, pages 122-126, 2009.
-
(2009)
DEXA Workshops
, pp. 122-126
-
-
Deitos, R.1
Kerschbaum, F.2
-
19
-
-
78649992236
-
Tasty: Tool for automating secure two-party computations
-
ACM
-
W. Henecka, S. Kögl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg. Tasty: tool for automating secure two-party computations. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 451-462. ACM, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 451-462
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
21
-
-
73649111765
-
Performance comparison of secure comparison protocols
-
DEXA '09. 20th International Workshop on Business Processes Security
-
F. Kerschbaum, D. Biswas, and S. de Hoogh. Performance comparison of secure comparison protocols. In Database and Expert Systems Application, 2009. DEXA '09. 20th International Workshop on Business Processes Security, pages 133-136, 2009.
-
(2009)
Database and Expert Systems Application, 2009
, pp. 133-136
-
-
Kerschbaum, F.1
Biswas, D.2
De Hoogh, S.3
-
23
-
-
24144477856
-
Secure computation of the mean and related statistics
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
E. Kiltz, G. Leander, and J. Malone-Lee. Secure computation of the mean and related statistics. In Proceedings of Theory of Cryptography Conference, Lecture Notes in Computer Science 3378, pages 283-302, 2005. (Pubitemid 41231170)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 283-302
-
-
Kiltz, E.1
Leander, G.2
Malone-Lee, J.3
-
25
-
-
0000653210
-
Selecting cryptographic key sizes
-
DOI 10.1007/s00145-001-0009-4
-
A. K. Lenstra and E. R. Verheul. Selecting cryptographic key sizes. J. Cryptology, 14(4):255-293, 2001. (Pubitemid 33770276)
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
26
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay - a secure two-party computation system. In Proceedings of the USENIX security symposium, pages 287-302, 2004.
-
(2004)
Proceedings of the USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
28
-
-
84942550998
-
Public-key cryptosystems based on composite degree resid-uosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree resid-uosity classes. In Proceedings of EUROCRYPT, Lecture Notes in Computer Science 1592, pages 223-238, 1999.
-
(1999)
Proceedings of EUROCRYPT, Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
29
-
-
78649448008
-
Secure collaborative supply chain planning and inverse optimization - The jels model
-
R. Pibernik, Y. Zhang, F. Kerschbaum, and A. Schröpfer. Secure collaborative supply chain planning and inverse optimization - the jels model. European Journal of Operational Research, 208(1):75-85, 2011.
-
(2011)
European Journal of Operational Research
, vol.208
, Issue.1
, pp. 75-85
-
-
Pibernik, R.1
Zhang, Y.2
Kerschbaum, F.3
Schröpfer, A.4
-
30
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. In Communications of the ACM, 22(11), pages 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
31
-
-
80054997033
-
-
Sharemind. http://sharemind.cs.ut.ee/wiki/, 2010.
-
(2010)
-
-
-
33
-
-
80054971580
-
-
Virtual Ideal Functionality Framework. http://www.viff.sk, 2010.
-
(2010)
-
-
|