-
2
-
-
50249148321
-
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Aumasson, J.-P., Fischer, S., Khazaei, S., Meier, W., Rechberger, C.: New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 470-488. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 470-488
-
-
Aumasson, J.-P.1
Fischer, S.2
Khazaei, S.3
Meier, W.4
Rechberger, C.5
-
3
-
-
85154002090
-
Sorting networks and their applications
-
ACM
-
Batcher, K.E.: Sorting networks and their applications. In: Proc. of AFIPS 1968, pp. 307-314. ACM (1968)
-
(1968)
Proc. of AFIPS 1968
, pp. 307-314
-
-
Batcher, K.E.1
-
4
-
-
70349266254
-
FairplayMP: A system for secure multi-party computation
-
ACM
-
Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: Proc. of CCS 2008, pp. 257-266. ACM (2008)
-
(2008)
Proc. of CCS 2008
, pp. 257-266
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
6
-
-
85062838317
-
Safeguarding cryptographic keys
-
AFIPS Press
-
Blakley, G.R.: Safeguarding cryptographic keys. In: Proc. of AFIPS 1979, pp. 313-317. AFIPS Press (1979)
-
(1979)
Proc. of AFIPS 1979
, pp. 313-317
-
-
Blakley, G.R.1
-
7
-
-
57049188348
-
Sharemind: A Framework for Fast Privacy- Preserving Computations
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A Framework for Fast Privacy- Preserving Computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192-206. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
8
-
-
84873942693
-
Deploying secure multi-party computation for financial data analysis
-
ePrint Archive, Report 2011/662
-
Bogdanov, D., Talviste, R., Willemson, J.: Deploying secure multi-party computation for financial data analysis. Cryptology ePrint Archive, Report 2011/662 (2011)
-
(2011)
Cryptology
-
-
Bogdanov, D.1
Talviste, R.2
Willemson, J.3
-
9
-
-
70350379222
-
Secure Multiparty Computation Goes Live
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
-
Bogetoft, P., Christensen, D.L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure Multiparty Computation Goes Live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325-343. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5628
, pp. 325-343
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgård, I.3
Geisler, M.4
Jakobsen, T.5
Krøigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.11
Toft, T.12
-
10
-
-
84863447066
-
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
-
Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. In: Proc. of USENIX Security Symposium 2010, pp. 223-239 (2010)
-
(2010)
Proc. of USENIX Security Symposium 2010
, pp. 223-239
-
-
Burkhart, M.1
Strasser, M.2
Many, D.3
Dimitropoulos, X.4
-
11
-
-
33749007039
-
Secure computation of surveys
-
Feigenbaum, J., Pinkas, B., Ryger, R., Saint-Jean, F.: Secure computation of surveys. In: EU Workshop on Secure Multiparty Protocols (2004)
-
EU Workshop on Secure Multiparty Protocols (2004)
-
-
Feigenbaum, J.1
Pinkas, B.2
Ryger, R.3
Saint-Jean, F.4
-
12
-
-
84865830708
-
Some requirements for adoption of privacy-preserving data mining
-
Feigenbaum, J., Pinkas, B., Ryger, R., Saint-Jean, F.: Some requirements for adoption of privacy-preserving data mining. PORTIA Project White Paper (2005)
-
(2005)
PORTIA Project White Paper
-
-
Feigenbaum, J.1
Pinkas, B.2
Ryger, R.3
Saint-Jean, F.4
-
13
-
-
78649992236
-
TASTY: Tool for automating secure two-party computations
-
ACM
-
Henecka, W., Kögl, S., Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: TASTY: tool for automating secure two-party computations. In: Proc. of CCS 2010, pp. 451-462. ACM (2010)
-
(2010)
Proc. of CCS 2010
, pp. 451-462
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
15
-
-
80054814127
-
VMCrypt - Modular software architecture for scalable secure computation
-
ePrint Archive, Report 2010/584
-
Malka, L., Katz, J.: VMCrypt - modular software architecture for scalable secure computation. Cryptology ePrint Archive, Report 2010/584 (2010)
-
(2010)
Cryptology
-
-
Malka, L.1
Katz, J.2
-
16
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Commun. ACM 22, 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|