-
1
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds
-
J. Bar-Ilan and D. Beaver. Non-cryptographic fault-tolerant computing in a constant number of rounds. In Proc. of 8th PODC, pages 201-209, 1989.
-
(1989)
Proc. of 8th PODC
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
2
-
-
33746365751
-
Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty minority
-
Springer-Verlag
-
D. Beaver. Secure Multi-party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority. J. Cryptology, Springer-Verlag, (1991) 4: 75-122.
-
(1991)
J. Cryptology
, vol.4
, pp. 75-122
-
-
Beaver, D.1
-
3
-
-
84869157856
-
Minimal-latency secure function evaluation
-
D. Beaver. Minimal-latency secure function evaluation. EUROCRYPT 2000.
-
(2000)
EUROCRYPT
-
-
Beaver, D.1
-
5
-
-
0025137207
-
The round complexity of secure protocols (extended abstract)
-
D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols (extended abstract). In Proc. of 22nd STOC, pages 503-513, 1990.
-
(1990)
Proc. of 22nd STOC
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
6
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A.Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. STOC, 1988.
-
(1988)
STOC
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
8
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. J. of Cryptology, 13(1), 2000.
-
(2000)
J. of Cryptology
, vol.13
, Issue.1
-
-
Canetti, R.1
-
9
-
-
84898947315
-
Multiparty unconditionally secure protocols (extended abstract)
-
D. Chaum, C. Crépeau, and I. Damgrard. Multiparty unconditionally secure protocols (extended abstract). In Proc. of 20th STOC, pages 11-19, 1988.
-
(1988)
Proc. of 20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgrard, I.3
-
10
-
-
84870398909
-
Secure distributed linear algebra in a constant number of rounds
-
R. Cramer and I. Damgrard. Secure distributed linear algebra in a constant number of rounds. In Proc. Crypto 2001.
-
Proc. Crypto 2001
-
-
Cramer, R.1
Damgrard, I.2
-
11
-
-
0002626155
-
General secure multi-party computation from any linear secret-sharing scheme
-
R. Cramer, I. Damgrard, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In Proc. of EUROCRYPT 2000.
-
Proc. of EUROCRYPT 2000
-
-
Cramer, R.1
Damgrard, I.2
Maurer, U.3
-
13
-
-
0027986369
-
Aminimal model for secure computation (extended abstract)
-
U. Feige, J. Kilian, and M. Naor.Aminimal model for secure computation (extended abstract). In Proc. of 26th STOC, pages 554-563, 1994.
-
(1994)
Proc. of 26th STOC
, pp. 554-563
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
15
-
-
33747194089
-
Fair computation of general functions in presence of immoral majority
-
Springer-Verlag
-
S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In CRYPTO '90, LNCS 537, Springer-Verlag, 1990.
-
(1990)
CRYPTO '90, LNCS 537
-
-
Goldwasser, S.1
Levin, L.2
-
18
-
-
0030718794
-
Private simultaneous messages protocols with applications
-
Y. Ishai and E. Kushilevitz. Private simultaneous messages protocols with applications. In Proc. of ISTCS '97, pp. 174-183, 1997.
-
(1997)
Proc. of ISTCS '97
, pp. 174-183
-
-
Ishai, Y.1
Kushilevitz, E.2
-
19
-
-
0003502009
-
Randomizing polynomials: A new representation with applications to round-efficient secure computation
-
Y. Ishai and E. Kushilevitz. Randomizing Polynomials:A New Representation with Applications to Round-Efficient Secure Computation. In Proc. of FOCS '00.
-
Proc. of FOCS '00
-
-
Ishai, Y.1
Kushilevitz, E.2
-
20
-
-
84898989941
-
Basing cryptography on oblivious transfer
-
J. Kilian. Basing cryptography on oblivious transfer. STOC '98, pp. 20-31, 1988.
-
(1988)
STOC '98
, pp. 20-31
-
-
Kilian, J.1
-
21
-
-
4544235438
-
Parallel coin-tossing and constant-round secure two-party computation
-
Y. Lindell. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. In Prof. of Crypto '01.
-
Prof. of Crypto '01
-
-
Lindell, Y.1
-
25
-
-
0001772530
-
Protocols for secure computations (extended abstract)
-
A. C.Yao. Protocols for secure computations (extended abstract). In Proc. of FOCS 1982.
-
(1982)
Proc. of FOCS
-
-
Yao, A.C.1
-
26
-
-
0003113271
-
How to generate and exchange secrets
-
A. C.Yao. How to generate and exchange secrets. In Proc. of FOCS 1986.
-
(1986)
Proc. of FOCS
-
-
Yao, A.C.1
|