-
1
-
-
85032877753
-
Non-interactive oblivious transfer and applications
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Bellare, M., Micali, S.: Non-interactive oblivious transfer and applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 547-557. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
2
-
-
70349266254
-
FairplayMP: A System for Secure Multi- Party Computation
-
ACM, New York
-
Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a System for Secure Multi- Party Computation. In: 15th ACM Conference on Computer and Communications Security, CCS 2008, pp. 257-266. ACM, New York (2008)
-
(2008)
15th ACM Conference on Computer and Communications Security, CCS 2008
, pp. 257-266
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
3
-
-
70350400281
-
Privacy-Preserving Classifier Learning
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
-
Brickell, J., Shmatikov, V.: Privacy-Preserving Classifier Learning. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 128-147. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5628
, pp. 128-147
-
-
Brickell, J.1
Shmatikov, V.2
-
5
-
-
78649992236
-
TASTY: Tool for Automating Secure Two-Party Computations
-
Henecka, W., Kögl, S., Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: TASTY: Tool for Automating Secure Two-Party Computations. In: Proc. 17th ACM Symposium on Computer and Communications Security, CCS 2010, Chicago, IL (October 2010)
-
Proc. 17th ACM Symposium on Computer and Communications Security, CCS 2010, Chicago, IL (October 2010)
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
7
-
-
84914127581
-
Faster Secure Two-Party Computation Using Garbled Circuits
-
Huang, Y., Evans, D., Katz, J., Malka, L.: Faster Secure Two-Party Computation Using Garbled Circuits. In: Proceedings of the 20th USENIX Security Symposium, San Francisco, CA (August 2011)
-
Proceedings of the 20th USENIX Security Symposium, San Francisco, CA (August 2011)
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
8
-
-
50249177701
-
Towards Practical Privacy for Genomic Computation
-
November
-
Jha, S., Kruger, L., Shmatikov, V.: Towards Practical Privacy for Genomic Computation. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp. 216-230 (November 2008)
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy, Berkeley, CA, USA
, pp. 216-230
-
-
Jha, S.1
Kruger, L.2
Shmatikov, V.3
-
9
-
-
49049099825
-
Improved Garbled Circuit: Free XOR Gates and Applications
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
-
Kolesnikov, V., Schneider, T.: Improved Garbled Circuit: Free XOR Gates and Applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
10
-
-
34547335279
-
Secure Function Evaluation with Ordered Binary Decision Diagrams
-
Kruger, L., Jha, S., Goh, E.-J., Boneh, D.: Secure Function Evaluation with Ordered Binary Decision Diagrams. In: Proceedings of the 13th ACM conference on Computer and Communications Security (CCS 2006), Alexandria, VA (October 2006)
-
Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, VA (October 2006)
-
-
Kruger, L.1
Jha, S.2
Goh, E.-J.3
Boneh, D.4
-
11
-
-
84865834234
-
-
Fairplay Project
-
Malkhi, D., Nisan, N., Pinkas, B.: Fairplay Project, http://www.cs.huji. ac.il/project/Fairplay/
-
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
-
12
-
-
85084163840
-
Fairplay: A Secure Two-Party Computation System
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay: a Secure Two-Party Computation System. In: Proceedings of the 13th USENIX Security Symposium, San Diego, CA (2004)
-
Proceedings of the 13th USENIX Security Symposium, San Diego, CA (2004)
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
13
-
-
84865818017
-
-
Technical Report CIS-TR-2011-04, Department of Computer and Information Science, University of Oregon, Eugene, OR, USA September
-
Mood, B., Letaw, L., Butler, K.: Memory-Efficient Garbled Circuit Generation for Mobile Devices. Technical Report CIS-TR-2011-04, Department of Computer and Information Science, University of Oregon, Eugene, OR, USA (September 2011)
-
(2011)
Memory-Efficient Garbled Circuit Generation for Mobile Devices
-
-
Mood, B.1
Letaw, L.2
Butler, K.3
-
16
-
-
72449131818
-
Secure Two-Party Computation Is Practical
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure Two-Party Computation Is Practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
17
-
-
84865821050
-
Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture
-
ePrint Archive, Report 2011/097
-
Pu, S., Duan, P., Liu, J.-C.: Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture. Cryptology ePrint Archive, Report 2011/097 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology
-
-
Pu, S.1
Duan, P.2
Liu, J.-C.3
|