-
1
-
-
79956298358
-
Randomly Encoding Functions: A New Cryptographic Paradigm
-
(Invited Talk). Fehr, S. (ed.) ICITS 2011. Springer, Heidelberg
-
Applebaum, B.: Randomly Encoding Functions: A New Cryptographic Paradigm (Invited Talk). In: Fehr, S. (ed.) ICITS 2011. LNCS, vol. 6673, pp. 25-31. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6673
, pp. 25-31
-
-
Applebaum, B.1
-
2
-
-
70350342511
-
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 595-618
-
-
Applebaum, B.1
Cash, D.2
Peikert, C.3
Sahai, A.4
-
3
-
-
80051980769
-
Semantic security under related-key attacks and applications
-
Applebaum, B., Harnik, D., Ishai, Y.: Semantic security under related-key attacks and applications. In: ICS, pp. 45-60 (2011)
-
(2011)
ICS
, pp. 45-60
-
-
Applebaum, B.1
Harnik, D.2
Ishai, Y.3
-
4
-
-
33745306666
-
Computationally private randomizing polynomials and their applications
-
Applebaum, B., Ishai, Y., Kushilevitz, E.: Computationally private randomizing polynomials and their applications. Computional Complexity 15(2), 115-162 (2006);
-
(2006)
Computional Complexity
, vol.15
, Issue.2
, pp. 115-162
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
6
-
-
84863309994
-
How to garble arithmetic circuits
-
Applebaum, B., Ishai, Y., Kushilevitz, E.: How to garble arithmetic circuits. In: FOCS, pp. 120-129 (2011)
-
(2011)
FOCS
, pp. 120-129
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
7
-
-
77957013831
-
Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Bellare, M., Cash, D.: Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 666-684. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 666-684
-
-
Bellare, M.1
Cash, D.2
-
8
-
-
84873976586
-
Garbling schemes
-
Report 2012/265
-
Bellare, M., Hoang, V.T., Rogaway, P.: Garbling schemes. Cryptology ePrint Archive, Report 2012/265 (2012), http://eprint.iacr.org/
-
(2012)
Cryptology ePrint Archive
-
-
Bellare, M.1
Hoang, V.T.2
Rogaway, P.3
-
9
-
-
35248860702
-
A Theoretical Treatment of Related-Key Attacks: RKAPRPs, RKA-PRFs, and Applications
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Bellare, M., Kohno, T.: A Theoretical Treatment of Related-Key Attacks: RKAPRPs, RKA-PRFs, and Applications. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 491-506. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 491-506
-
-
Bellare, M.1
Kohno, T.2
-
11
-
-
35248822352
-
Encryption-scheme security in the presence of key-dependent messages
-
Nyberg, K., Heys, H.M. (eds.) SAC 2002. Springer, Heidelberg
-
Black, J., Rogaway, P., Shrimpton, T.: Encryption-scheme security in the presence of key-dependent messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 62-75. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2595
, pp. 62-75
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
12
-
-
84877639283
-
Cryptographic Primitives Based on Hard Learning Problems
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg citeseer.nj.nec.com/blum94cryptographic.html
-
Blum, A., Furst, M., Kearns, M., Lipton, R.J.: Cryptographic Primitives Based on Hard Learning Problems. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 278-291. Springer, Heidelberg (1994), citeseer.nj.nec.com/ blum94cryptographic.html
-
(1994)
LNCS
, vol.773
, pp. 278-291
-
-
Blum, A.1
Furst, M.2
Kearns, M.3
Lipton, R.J.4
-
13
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput. 13, 850-864 (1984);
-
(1984)
SIAM J. Comput.
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
15
-
-
51849118137
-
Circular-Secure Encryption from Decision Diffie-Hellman
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Boneh, D., Halevi, S., Hamburg, M., Ostrovsky, R.: Circular-Secure Encryption from Decision Diffie-Hellman. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 108-125. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 108-125
-
-
Boneh, D.1
Halevi, S.2
Hamburg, M.3
Ostrovsky, R.4
-
16
-
-
84945135810
-
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Camenisch, J.L., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.L.1
Lysyanskaya, A.2
-
18
-
-
84863382720
-
On the Security of the "Free-XOR" Technique
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
-
Choi, S.G., Katz, J., Kumaresan, R., Zhou, H.-S.: On the Security of the "Free-XOR" Technique. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 39-53. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7194
, pp. 39-53
-
-
Choi, S.G.1
Katz, J.2
Kumaresan, R.3
Zhou, H.-S.4
-
19
-
-
49149109143
-
How to Encrypt with the LPN Problem
-
Aceto, L., Damgård, I.B., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
-
Gilbert, H., Robshaw, M.J.B., Seurin, Y.: How to Encrypt with the LPN Problem. In: Aceto, L., Damgård, I.B., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 679-690. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 679-690
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Seurin, Y.3
-
20
-
-
0027797493
-
On the existence of pseudorandom generators
-
Goldreich, O., Krawczyk, H., Luby, M.: On the existence of pseudorandom generators. SIAM J. Comput. 22(6), 1163-1175 (1993);
-
(1993)
SIAM J. Comput.
, vol.22
, Issue.6
, pp. 1163-1175
-
-
Goldreich, O.1
Krawczyk, H.2
Luby, M.3
-
22
-
-
0023545076
-
How to play ANY mental game
-
Goldreich, O., Micali, S.,Wigderson, A.: How to play ANY mental game. In: STOC, pp. 218-229 (1987)
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
23
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364-1396 (1999)
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
24
-
-
78649992236
-
TASTY: Tool for automating secure two-party computations
-
Henecka, W., Kögl, S., Sadeghi, A.R., Schneider, T., Wehrenberg, I.: TASTY: tool for automating secure two-party computations. In: CCS, pp. 451-462 (2010)
-
(2010)
CCS
, pp. 451-462
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.R.3
Schneider, T.4
Wehrenberg, I.5
-
25
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: USENIX Security Symposium (2011)
-
USENIX Security Symposium (2011)
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
26
-
-
81855220955
-
Efficient Secure Computation with Garbled Circuits
-
Jajodia, S., Mazumdar, C. (eds.) ICISS 2011. Springer, Heidelberg
-
Huang, Y., Shen, C.-H., Evans, D., Katz, J., Shelat, A.: Efficient Secure Computation with Garbled Circuits. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2011. LNCS, vol. 7093, pp. 28-48. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7093
, pp. 28-48
-
-
Huang, Y.1
Shen, C.-H.2
Evans, D.3
Katz, J.4
Shelat, A.5
-
27
-
-
24144457853
-
Extending Oblivious Transfers Efficiently
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending Oblivious Transfers Efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
28
-
-
0034507841
-
Randomizing polynomials: A new representation with applications to round-efficient secure computation
-
citeseer.nj.nec.com/ishai00randomizing.html
-
Ishai, Y., Kushilevitz, E.: Randomizing polynomials: A new representation with applications to round-efficient secure computation. In: Proc. 41st FOCS, pp. 294-304 (2000), citeseer.nj.nec.com/ishai00randomizing.html
-
(2000)
Proc. 41st FOCS
, pp. 294-304
-
-
Ishai, Y.1
Kushilevitz, E.2
-
29
-
-
71549170830
-
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
-
Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1-20. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
30
-
-
49049099825
-
Improved Garbled Circuit: Free XOR Gates and Applications
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
-
Kolesnikov, V., Schneider, T.: Improved Garbled Circuit: Free XOR Gates and Applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
31
-
-
84866714499
-
Towards billion-gate secure computation with malicious adversaries
-
Kreuter, B., Shelat, A., Shen, C.H.: Towards billion-gate secure computation with malicious adversaries. IACR Cryptology ePrint Archive 2012, 179 (2012)
-
(2012)
IACR Cryptology ePrint Archive
, vol.2012
, pp. 179
-
-
Kreuter, B.1
Shelat, A.2
Shen, C.H.3
-
32
-
-
52149120767
-
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
-
Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. Springer, Heidelberg
-
Lindell, Y., Pinkas, B., Smart, N.P.: Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 2-20. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5229
, pp. 2-20
-
-
Lindell, Y.1
Pinkas, B.2
Smart, N.P.3
-
33
-
-
38049136534
-
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
34
-
-
64249101946
-
A proof of security of yao's protocol for two-party computation
-
Lindell, Y., Pinkas, B.: A proof of security of yao's protocol for two-party computation. J. Cryptology 22(2), 161-188 (2009)
-
(2009)
J. Cryptology
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
35
-
-
80054814127
-
Vmcrypt - Modular software architecture for scalable secure computation
-
Report 2010/584
-
Malka, L., Katz, J.: Vmcrypt - modular software architecture for scalable secure computation. Cryptology ePrint Archive, Report 2010/584 (2010), http://eprint.iacr.org/
-
(2010)
Cryptology ePrint Archive
-
-
Malka, L.1
Katz, J.2
-
36
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - A secure two-party computation system. In: Proc. of 13th USENIX Security Symposium (2004)
-
Proc. of 13th USENIX Security Symposium (2004)
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
37
-
-
84947240143
-
Indistinguishability of Random Systems
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Maurer, U.M.: Indistinguishability of Random Systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 110-132. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 110-132
-
-
Maurer, U.M.1
-
38
-
-
84957096920
-
Oblivious Transfer with Adaptive Queries
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Naor, M., Pinkas, B.: Oblivious Transfer with Adaptive Queries. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 573-590. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 573-590
-
-
Naor, M.1
Pinkas, B.2
-
39
-
-
84883898504
-
Privacy preserving auctions and mechanism design
-
Naor, M., Pinkas, B., Sumner, R.: Privacy preserving auctions and mechanism design. In: Proc. 1st ACM Conference on Electronic Commerce, pp. 129-139 (1999)
-
(1999)
Proc. 1st ACM Conference on Electronic Commerce
, pp. 129-139
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
40
-
-
70350634167
-
LEGO for Two-Party Secure Computation
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Nielsen, J.B., Orlandi, C.: LEGO for Two-Party Secure Computation. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 368-386. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 368-386
-
-
Nielsen, J.B.1
Orlandi, C.2
-
41
-
-
72449131818
-
Secure Two-Party Computation Is Practical
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure Two-Party Computation Is Practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
43
-
-
79958017670
-
Two-Output Secure Computation with Malicious Adversaries
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Shelat, A., Shen, C.-H.: Two-Output Secure Computation with Malicious Adversaries. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 386-405. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 386-405
-
-
Shelat, A.1
Shen, C.-H.2
-
44
-
-
0020301290
-
Theory and application of trapdoor functions
-
Yao, A.C.: Theory and application of trapdoor functions. In: Proc. 23rd FOCS, pp. 80-91 (1982)
-
(1982)
Proc. 23rd FOCS
, pp. 80-91
-
-
Yao, A.C.1
-
45
-
-
0022882770
-
How to generate and exchange secrets
-
Yao, A.C.: How to generate and exchange secrets. In: Proc. 27th FOCS, pp. 162-167 (1986)
-
(1986)
Proc. 27th FOCS
, pp. 162-167
-
-
Yao, A.C.1
|