-
1
-
-
80051954618
-
Perfectly-Secure Multiplication for Any t < n/3
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Asharov, G., Lindell, Y., Rabin, T.: Perfectly-Secure Multiplication for Any t < n/3. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 240-258. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 240-258
-
-
Asharov, G.1
Lindell, Y.2
Rabin, T.3
-
2
-
-
0022144867
-
Complexity of Network Synchronization
-
Awerbuch, B.: Complexity of Network Synchronization. Journal of the ACM 32, 804-823 (1985)
-
(1985)
Journal of the ACM
, vol.32
, pp. 804-823
-
-
Awerbuch, B.1
-
3
-
-
35248861968
-
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions
-
Amadio, R.M., Lugiez, D. (eds.) CONCUR 2003. Springer, Heidelberg
-
Backes, M.: Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions. In: Amadio, R.M., Lugiez, D. (eds.) CONCUR 2003. LNCS, vol. 2761, pp. 350-365. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2761
, pp. 350-365
-
-
Backes, M.1
-
4
-
-
31844445449
-
On Fairness in Simulatability-based Cryptographic Systems
-
ACM
-
Backes, M., Hofheinz, D., Müller-Quade, J., Unruh, D.: On Fairness in Simulatability-based Cryptographic Systems. In: Proceedings of FMSE, pp. 13-22. ACM (2005)
-
(2005)
Proceedings of FMSE
, pp. 13-22
-
-
Backes, M.1
Hofheinz, D.2
Müller-Quade, J.3
Unruh, D.4
-
5
-
-
84948731889
-
Polynomial Fairness and Liveness
-
IEEE
-
Backes, M., Pfitzmann, B., Steiner, M., Waidner, M.: Polynomial Fairness and Liveness. In: Proceedings of the 15th Annual IEEE Computer Security Foundations Workshop, pp. 160-174. IEEE (2002)
-
(2002)
Proceedings of the 15th Annual IEEE Computer Security Foundations Workshop
, pp. 160-174
-
-
Backes, M.1
Pfitzmann, B.2
Steiner, M.3
Waidner, M.4
-
6
-
-
84855205195
-
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems
-
Backes, M., Pfitzmann, B., Waidner, M.: The Reactive Simulatability (RSIM) Framework for Asynchronous Systems. Information and Computation 205, 1685-1720 (2007)
-
(2007)
Information and Computation
, vol.205
, pp. 1685-1720
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
7
-
-
0027188428
-
Asynchronous Secure Computation
-
ACM
-
Ben-Or, M., Canetti, R., Goldreich, O.: Asynchronous Secure Computation. In: Proceedings of the 25th Annual ACM Symposium on Theory of Computing, pp. 52-61. ACM (1993)
-
(1993)
Proceedings of the 25th Annual ACM Symposium on Theory of Computing
, pp. 52-61
-
-
Ben-Or, M.1
Canetti, R.2
Goldreich, O.3
-
8
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
ACM
-
Ben-Or, M., Goldwasser, S., Widgerson, A.: Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In: Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pp. 1-10. ACM (1988)
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Widgerson, A.3
-
10
-
-
28144462281
-
Universally Composable Security: A New Paradigm for Cryptographic Protocols
-
Report 2000/067
-
Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: Cryptology ePrint Archive, Report 2000/067 (2005)
-
(2005)
Cryptology ePrint Archive
-
-
Canetti, R.1
-
11
-
-
0000731055
-
Security and Composition of Multiparty Cryptographic Protocols
-
Canetti, R.: Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology 13, 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, pp. 143-202
-
-
Canetti, R.1
-
13
-
-
84880897758
-
Universally Composable Commitments
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Canetti, R., Fischlin, M.: Universally Composable Commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19-40. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
14
-
-
84947232363
-
Universally Composable Notions of Key Exchange and Secure Channels
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Universally Composable Notions of Key Exchange and Secure Channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 337-351. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
15
-
-
0036038991
-
Universally Composable Two-Party and Multi-Party Secure Computation
-
ACM
-
Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally Composable Two-Party and Multi-Party Secure Computation. In: Proceedings of the 34th Annual ACM Symposium on Theory of Computing, pp. 494-503. ACM (2002)
-
(2002)
Proceedings of the 34th Annual ACM Symposium on Theory of Computing
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
16
-
-
84898947315
-
Multiparty Unconditionally Secure Protocols
-
ACM
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty Unconditionally Secure Protocols. In: Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pp. 11-19. ACM (1988)
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
18
-
-
84974597111
-
Parallel Reducibility for Information-Theoretically Secure Computation
-
Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
-
Dodis, Y., Micali, S.: Parallel Reducibility for Information- Theoretically Secure Computation. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 74-92. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 74-92
-
-
Dodis, Y.1
Micali, S.2
-
20
-
-
0031632567
-
Concurrent Zero-Knowledge
-
ACM
-
Dwork, C., Naor, M., Sahai, A.: Concurrent Zero-Knowledge. In: Proceedings of the 30th Annual ACM Symposium on Theory of Computing, pp. 409-418. ACM (1998)
-
(1998)
Proceedings of the 30th Annual ACM Symposium on Theory of Computing
, pp. 409-418
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
21
-
-
79959901514
-
Adaptively Secure Broadcast, Revisited
-
ACM
-
Garay, J.A., Katz, J., Kumersan, R., Zhou, H.-S.: Adaptively Secure Broadcast, Revisited. In: Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, pp. 179-186. ACM (2011)
-
(2011)
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing
, pp. 179-186
-
-
Garay, J.A.1
Katz, J.2
Kumersan, R.3
Zhou, H.-S.4
-
22
-
-
0023545076
-
How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority
-
ACM
-
Goldreich, O., Micali, S., Widgerson, A.: How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp. 218-229. ACM (1987)
-
(1987)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Widgerson, A.3
-
24
-
-
77954642421
-
Adaptively Secure Broadcast
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Hirt, M., Zikas, V.: Adaptively Secure Broadcast. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 466-485. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 466-485
-
-
Hirt, M.1
Zikas, V.2
-
26
-
-
34848826278
-
Concurrent General Composition of Secure Protocols in the Timing Model
-
ACM
-
Kalai, Y.T., Lindell, Y., Prabhakaran, M.: Concurrent General Composition of Secure Protocols in the Timing Model. In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pp. 644-653. ACM (2005)
-
(2005)
Proceedings of the 37th Annual ACM Symposium on Theory of Computing
, pp. 644-653
-
-
Kalai, Y.T.1
Lindell, Y.2
Prabhakaran, M.3
-
27
-
-
84873962700
-
Universally Composable Synchronous Computation
-
Report 2011/310
-
Katz, J., Maurer, U., Tackmann, B., Zikas, V.: Universally Composable Synchronous Computation. In: Cryptology ePrint Archive, Report 2011/310 (2012)
-
(2012)
Cryptology ePrint Archive
-
-
Katz, J.1
Maurer, U.2
Tackmann, B.3
Zikas, V.4
-
28
-
-
70350657209
-
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Künzler, R., Müller-Quade, J., Raub, D.: Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 238-255. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 238-255
-
-
Künzler, R.1
Müller-Quade, J.2
Raub, D.3
-
29
-
-
33748109704
-
Information-theoretically Secure Protocols and Security under Composition
-
ACM
-
Kushilevitz, E., Lindell, Y., Rabin, T.: Information-theoretically Secure Protocols and Security under Composition. In: Proceedings of the 38th Annual ACM Symposium on Theory of Computing, pp. 109-118. ACM (2006)
-
(2006)
Proceedings of the 38th Annual ACM Symposium on Theory of Computing
, pp. 109-118
-
-
Kushilevitz, E.1
Lindell, Y.2
Rabin, T.3
-
30
-
-
77956988543
-
Cryptographic Complexity Classes and Computational Intractability Assumptions
-
Tsinghua University Press
-
Maji, H., Prabhakaran, M., Rosulek, M.: Cryptographic Complexity Classes and Computational Intractability Assumptions. In: Innovations in Computer Science. Tsinghua University Press (2010)
-
(2010)
Innovations in Computer Science
-
-
Maji, H.1
Prabhakaran, M.2
Rosulek, M.3
-
31
-
-
84946414653
-
Constructive Cryptography - A New Paradigm for Security Definitions and Proofs
-
Mödersheim, S., Palamidessi, C. (eds.) TOSCA 2011. Springer, Heidelberg
-
Maurer, U.: Constructive Cryptography - A New Paradigm for Security Definitions and Proofs. In: Mödersheim, S., Palamidessi, C. (eds.) TOSCA 2011. LNCS, vol. 6993, pp. 33-56. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.6993
, pp. 33-56
-
-
Maurer, U.1
|