-
2
-
-
80052447199
-
A smart-gentry based software system for secret program execution
-
SciTePress
-
Brenner, M., Wiebelitz, J., von Voigt, G., and Smith, M. (2011). A smart-gentry based software system for secret program execution. In Proc. of the International Conference on Security and Cryptography SECRYPT. SciTePress.
-
(2011)
Proc. of the International Conference on Security and Cryptography SECRYPT
-
-
Brenner, M.1
Wiebelitz, J.2
Von Voigt, G.3
Smith, M.4
-
3
-
-
80051993169
-
Fully homomorphic encryption over the integers with shorter public keys
-
volume 6841 of LNCS, Springer Berlin / Heidelberg
-
Coron, J.-S., Mandal, A., Naccache, D., and Tibouchi, M. (2011). Fully homomorphic encryption over the integers with shorter public keys. In Advances in Cryptology CRYPTO 2011, volume 6841 of LNCS. Springer Berlin / Heidelberg.
-
(2011)
Advances in Cryptology CRYPTO 2011
-
-
Coron, J.-S.1
Mandal, A.2
Naccache, D.3
Tibouchi, M.4
-
4
-
-
82955204091
-
Perfectly secure oblivious ram without random oracles
-
volume 6597 of LNCS. Springer Berlin / Heidelberg
-
Damgrd, I.,Meldgaard, S., and Nielsen, J. (2011). Perfectly secure oblivious ram without random oracles. In Theory of Cryptography, volume 6597 of LNCS. Springer Berlin / Heidelberg.
-
(2011)
Theory of Cryptography
-
-
Damgrd, I.1
Meldgaard, S.2
Nielsen, J.3
-
6
-
-
77957005127
-
IHOP homomorphic encryption and rerandomizable Yao circuits
-
volume 6223 of LNCS. Springer Berlin / Heidelberg
-
Gentry, C., Halevi, S., and Vaikuntanathan, V. (2010). ihop homomorphic encryption and rerandomizable yao circuits. In Advances in Cryptology - CRYPTO 2010, volume 6223 of LNCS. Springer Berlin / Heidelberg.
-
(2010)
Advances in Cryptology - CRYPTO 2010
-
-
Gentry, C.1
Halevi, S.2
Vaikuntanathan, V.3
-
8
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
Goldreich, O. and Ostrovsky, R. (1996). Software protection and simulation on oblivious rams. J. ACM, 43.
-
(1996)
J. ACM
, vol.43
-
-
Goldreich, O.1
Ostrovsky, R.2
-
9
-
-
79960005023
-
Privacypreserving access of outsourced data via oblivious ram simulation
-
volume 6756 of LNCS. Springer Berlin / Heidelberg
-
Goodrich, M. and Mitzenmacher, M. (2011). Privacypreserving access of outsourced data via oblivious ram simulation. In Automata, Languages and Programming, volume 6756 of LNCS. Springer Berlin / Heidelberg.
-
(2011)
Automata, Languages and Programming
-
-
Goodrich, M.1
Mitzenmacher, M.2
-
11
-
-
71549170830
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
volume 5888 of LNCS. Springer Berlin / Heidelberg
-
Kolesnikov, V., Sadeghi, A.-R., and Schneider, T. (2009b). Improved garbled circuit building blocks and applications to auctions and computing minima. In Cryptology and Network Security, volume 5888 of LNCS. Springer Berlin / Heidelberg.
-
(2009)
Cryptology and Network Security
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
12
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
Berkeley, CA, USA. USENIX Association
-
Malkhi, D., Nisan, N., Pinkas, B., and Sella, Y. (2004). Fairplay - a secure two-party computation system. In Proc. of the 13th conference on USENIX Security Symposium - Volume 13, SSYM'04, Berkeley, CA, USA. USENIX Association.
-
(2004)
Proc. of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM'04
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
13
-
-
80955157888
-
Can homomorphic encryption be practical?
-
New York, NY, USA. ACM
-
Naehrig, M., Lauter, K., and Vaikuntanathan, V. (2011). Can homomorphic encryption be practical? In Proc. of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, New York, NY, USA. ACM.
-
(2011)
Proc. of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW '11
-
-
Naehrig, M.1
Lauter, K.2
Vaikuntanathan, V.3
-
14
-
-
77957007201
-
Oblivious ram revisited
-
volume 6223 of LNCS. Springer Berlin / Heidelberg
-
Pinkas, B. and Reinman, T. (2010). Oblivious ram revisited. In Advances in Cryptology - CRYPTO 2010, volume 6223 of LNCS. Springer Berlin / Heidelberg.
-
(2010)
Advances in Cryptology - CRYPTO 2010
-
-
Pinkas, B.1
Reinman, T.2
-
15
-
-
79955532534
-
Fully homomorphic encryption with relatively small key and ciphertext sizes
-
volume 6056 of LNCS. Springer Berlin / Heidelberg
-
Smart, N. and Vercauteren, F. (2010). Fully homomorphic encryption with relatively small key and ciphertext sizes. In Public Key Cryptography, PKC 2010, volume 6056 of LNCS. Springer Berlin / Heidelberg.
-
(2010)
Public Key Cryptography, PKC 2010
-
-
Smart, N.1
Vercauteren, F.2
-
16
-
-
78650007395
-
Faster fully homomorphic encryption
-
volume 6477 of LNCS. Springer Berlin / Heidelberg
-
Stehl, D. and Steinfeld, R. (2010). Faster fully homomorphic encryption. In Advances in Cryptology - ASIACRYPT 2010, volume 6477 of LNCS. Springer Berlin / Heidelberg.
-
(2010)
Advances in Cryptology - ASIACRYPT 2010
-
-
Stehl, D.1
Steinfeld, R.2
-
17
-
-
66149192669
-
How to map billions of short reads onto genomes
-
Trapnell, C. and Salzberg, S. (2009). How to map billions of short reads onto genomes. Nature Biotechnology, 27(5).
-
(2009)
Nature Biotechnology
, vol.27
, Issue.5
-
-
Trapnell, C.1
Salzberg, S.2
|