-
1
-
-
38049082907
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
Springer Berlin. 10.1007/978-3-540-70936-7-8
-
Y. Aumann, Y. Lindell, Security against covert adversaries: efficient protocols for realistic adversaries, in Theory of Cryptography Conference-TCC 2007. LNCS, vol. 4392 (Springer, Berlin, 2007), pp. 137-156
-
(2007)
Theory of Cryptography Conference-TCC 2007. LNCS
, vol.4392
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
2
-
-
85029542707
-
Foundations of secure interactive computing
-
Springer Berlin
-
D. Beaver, Foundations of secure interactive computing, in Advances in Cryptology-Crypto '91. LNCS, vol. 576 (Springer, Berlin, 1992), pp. 377-391
-
(1992)
Advances in Cryptology-Crypto '91. LNCS
, vol.576
, pp. 377-391
-
-
Beaver, D.1
-
4
-
-
77956987124
-
Protocols for multiparty coin toss with dishonest majority
-
Springer Berlin. 10.1007/978-3-642-14623-7-29
-
A. Beimel, E. Omri, I. Orlov, Protocols for multiparty coin toss with dishonest majority, in Advances in Cryptology-Crypto 2010. LNCS, vol. 6223 (Springer, Berlin, 2010), pp. 538-557
-
(2010)
Advances in Cryptology-Crypto 2010. LNCS
, vol.6223
, pp. 538-557
-
-
Beimel, A.1
Omri, E.2
Orlov, I.3
-
6
-
-
84976804419
-
How to exchange (secret) keys
-
10.1145/357360.357368
-
M. Blum 1984 How to exchange (secret) keys ACM Trans. Comput. Syst. 1 175 193 10.1145/357360.357368
-
(1984)
ACM Trans. Comput. Syst.
, vol.1
, pp. 175-193
-
-
Blum, M.1
-
7
-
-
84974588386
-
Timed commitments
-
Springer Berlin. 10.1007/3-540-44598-6-15
-
D. Boneh, M. Naor, Timed commitments, in Advances in Cryptology-Crypto 2000. LNCS, vol. 1880 (Springer, Berlin, 2000), pp. 236-254
-
(2000)
Advances in Cryptology-Crypto 2000. LNCS
, vol.1880
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
8
-
-
84969520105
-
Optimistic fair secure computation
-
Springer Berlin. 10.1007/3-540-44598-6-6
-
C. Cachin, J. Camenisch, Optimistic fair secure computation, in Advances in Cryptology -Crypto 2000. LNCS, vol. 1880 (Springer, Berlin, 2000), pp. 93-111
-
(2000)
Advances in Cryptology -Crypto 2000. LNCS
, vol.1880
, pp. 93-111
-
-
Cachin, C.1
Camenisch, J.2
-
9
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
10.1007/s001459910006 0957.68040 1732900
-
R. Canetti 2000 Security and composition of multiparty cryptographic protocols J. Cryptol. 13 1 143 202 10.1007/s001459910006 0957.68040 1732900
-
(2000)
J. Cryptol.
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
10
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols, in 42nd Annual Symposium on Foundations of Computer Science (FOCS) (IEEE Press, New York, 2001), pp. 136-145 (Pubitemid 33068374)
-
(2001)
Annual Symposium on Foundations of Computer Science - Proceedings
, pp. 136-145
-
-
Canetti, R.1
-
11
-
-
0012610677
-
Limits on the security of coin flips when half the processors are faulty
-
Assoc. Comput. Mach. New York
-
R. Cleve, Limits on the security of coin flips when half the processors are faulty, in 18th Annual ACM Symposium on Theory of Computing (STOC) (Assoc. Comput. Mach., New York, 1986), pp. 364-369
-
(1986)
18th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 364-369
-
-
Cleve, R.1
-
12
-
-
85032862578
-
Controlled gradual disclosure schemes for random bits and their applications
-
Springer Berlin
-
R. Cleve, Controlled gradual disclosure schemes for random bits and their applications, in Advances in Cryptology-Crypto '89. LNCS, vol. 435 (Springer, Berlin, 1990), pp. 573-588
-
(1990)
Advances in Cryptology-Crypto '89. LNCS
, vol.435
, pp. 573-588
-
-
Cleve, R.1
-
13
-
-
0029362450
-
Practical and provably secure release of a secret and exchange of signatures
-
10.1007/BF00191356 0840.94014
-
I. Damgård 1995 Practical and provably secure release of a secret and exchange of signatures J. Cryptol. 8 4 201 222 10.1007/BF00191356 0840.94014
-
(1995)
J. Cryptol.
, vol.8
, Issue.4
, pp. 201-222
-
-
Damgård, I.1
-
14
-
-
20444446289
-
Concurrent zero-knowledge
-
DOI 10.1145/1039488.1039489
-
C. Dwork M. Naor A. Sahai 2004 Concurrent zero-knowledge J. ACM 51 6 851 898 1125.94031 2145257 (Pubitemid 40818309)
-
(2004)
Journal of the ACM
, vol.51
, Issue.6
, pp. 851-898
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
15
-
-
0022080529
-
A randomized protocol for signing contracts
-
DOI 10.1145/3812.3818
-
S. Even O. Goldreich A. Lempel 1985 A randomized protocol for signing contracts Commun. ACM 28 6 637 647 10.1145/3812.3818 800680 (Pubitemid 15569164)
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even Shimon1
Goldreich Oded2
Lempel Abraham3
-
17
-
-
84976655650
-
Cryptographic computation: Secure faut-tolerant protocols and the public-key model
-
Springer Berlin
-
Z. Galil, S. Haber, M. Yung, Cryptographic computation: Secure faut-tolerant protocols and the public-key model, in Advances in Cryptology-Crypto '87. LNCS, vol. 293 (Springer, Berlin, 1988), pp. 135-155
-
(1988)
Advances in Cryptology-Crypto '87. LNCS
, vol.293
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
18
-
-
33745536762
-
Resource fairness and composability of cryptographic protocols
-
DOI 10.1007/11681878-21, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
J.A. Garay, P.D. MacKenzie, M. Prabhakaran, K. Yang, Resource fairness and composability of cryptographic protocols, in 3rd Theory of Cryptography Conference-TCC 2006. LNCS, vol. 3876 (Springer, Berlin, 2006), pp. 404-428 (Pubitemid 43979860)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876
, pp. 404-428
-
-
Garay, J.1
MacKenzie, P.2
Prabhakaran, M.3
Yang, K.4
-
20
-
-
33745184723
-
Session-key generation using human passwords only
-
10.1007/s00145-006-0233-z 1103.68513 2241561
-
O. Goldreich Y. Lindell 2006 Session-key generation using human passwords only J. Cryptol. 19 3 241 340 10.1007/s00145-006-0233-z 1103.68513 2241561
-
(2006)
J. Cryptol.
, vol.19
, Issue.3
, pp. 241-340
-
-
Goldreich, O.1
Lindell, Y.2
-
21
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Springer Berlin
-
S. Goldwasser, L.A. Levin, Fair computation of general functions in presence of immoral majority, in Advances in Cryptology-Crypto '90. LNCS, vol. 537 (Springer, Berlin, 1991), pp. 77-93
-
(1991)
Advances in Cryptology-Crypto '90. LNCS
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.A.2
-
23
-
-
70350630630
-
Complete fairness in multi-party computation without an honest majority
-
Springer Berlin
-
S. Gordon, J. Katz, Complete fairness in multi-party computation without an honest majority, in 6th Theory of Cryptography Conference-TCC 2009. LNCS, vol. 5444 (Springer, Berlin, 2009), pp. 19-35
-
(2009)
6th Theory of Cryptography Conference-TCC 2009. LNCS
, vol.5444
, pp. 19-35
-
-
Gordon, S.1
Katz, J.2
-
24
-
-
57049135299
-
Complete fairness in secure two-party computation
-
Assoc. Comput. Mach. New York
-
S.D. Gordon, C. Hazay, J. Katz, Y. Lindell, Complete fairness in secure two-party computation, in 40th Annual ACM Symposium on Theory of Computing (STOC) (Assoc. Comput. Mach., New York, 2008), pp. 413-422
-
(2008)
40th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 413-422
-
-
Gordon, S.D.1
Hazay, C.2
Katz, J.3
Lindell, Y.4
-
25
-
-
35448952561
-
On achieving the "best of both worlds" in secure multiparty computation
-
DOI 10.1145/1250790.1250793, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing
-
J. Katz, On achieving the "best of both worlds" in secure multiparty computation, in 39th Annual ACM Symposium on Theory of Computing (STOC) (Assoc. Comput. Mach., New York, 2007), pp. 11-20 (Pubitemid 47630716)
-
(2007)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 11-20
-
-
Katz, J.1
-
26
-
-
10444265884
-
Completely fair SFE and coalition-safe cheap talk
-
Assoc. Comput. Mach. New York
-
M. Lepinski, S. Micali, C. Peikert, A. Shelat, Completely fair SFE and coalition-safe cheap talk, in 23rd Annual ACM Symposium on Principles of Distributed Computing (PODC) (Assoc. Comput. Mach., New York, 2004), pp. 1-10
-
(2004)
23rd Annual ACM Symposium on Principles of Distributed Computing (PODC)
, pp. 1-10
-
-
Lepinski, M.1
Micali, S.2
Peikert, C.3
Shelat, A.4
-
27
-
-
0020889143
-
How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin
-
IEEE Press New York
-
M. Luby, S. Micali, C. Rackoff, How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin, in 24th Annual Symposium on Foundations of Computer Science (FOCS) (IEEE Press, New York, 1983), pp. 23-30
-
(1983)
24th Annual Symposium on Foundations of Computer Science (FOCS)
, pp. 23-30
-
-
Luby, M.1
Micali, S.2
Rackoff, C.3
-
28
-
-
84974655726
-
Secure computation
-
Springer Berlin
-
S. Micali, P. Rogaway, Secure computation, in Advances in Cryptology-Crypto '91. LNCS, vol. 576 (Springer, Berlin, 1992), pp. 392-404
-
(1992)
Advances in Cryptology-Crypto '91. LNCS
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
29
-
-
70350649064
-
An optimally fair coin toss
-
Springer Berlin
-
T. Moran, M. Naor, G. Segev, An optimally fair coin toss, in 6th Theory of Cryptography Conference-TCC 2009. LNCS, vol. 5444 (Springer, Berlin, 2009), pp. 1-18
-
(2009)
6th Theory of Cryptography Conference-TCC 2009. LNCS
, vol.5444
, pp. 1-18
-
-
Moran, T.1
Naor, M.2
Segev, G.3
-
30
-
-
35248883427
-
Fair Secure Two-Party Computation
-
Advances in Cryptology - EUROCRPYT 2003: International Conference on the Theory and Applications of Cryptographic Techniques Warsaw, Poland, May 4-8, 2003 Proceedings
-
B. Pinkas, Fair secure two-party computation, in Advances in Cryptology-Eurocrypt 2003. LNCS, vol. 2656 (Springer, Berlin, 2003), pp. 87-105 (Pubitemid 36572170)
-
(2003)
LNCS
, Issue.2656
, pp. 87-105
-
-
Pinkas, B.1
|