-
1
-
-
84873946513
-
-
Full version of this work
-
Full version of this work. Cryptology ePrint Archive (2013)
-
(2013)
Cryptology ePrint Archive
-
-
-
2
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: 20th STOC, pp. 1-10 (1988)
-
(1988)
20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
4
-
-
84957671573
-
Multiparty unconditionally secure protocols
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols. In: The 20th STOC, pp. 1-10 (1988)
-
(1988)
The 20th STOC
, pp. 1-10
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
5
-
-
0012610677
-
Limits on the security of coin flips when half the processors are faulty
-
extended abstract
-
Cleve, R.: Limits on the security of coin flips when half the processors are faulty (extended abstract). In: The 18th STOC, pp. 364-369 (1986)
-
(1986)
The 18th STOC
, pp. 364-369
-
-
Cleve, R.1
-
6
-
-
33645593031
-
The Foundations of Cryptography
-
Cambridge University Press
-
Goldreich, O.: The Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press (2004)
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
7
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
Goldreich, O., Micali, S.,Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. JACM 38(1), 691-729 (1991)
-
(1991)
JACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
8
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: The 19th STOC, pp. 218-229 (1987)
-
(1987)
The 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
9
-
-
84855248474
-
Complete fairness in secure two-party computation
-
Gordon, S.D., Hazay, C., Katz, J., Lindell, Y.: Complete fairness in secure two-party computation. JACM 58(6), 24 (2011)
-
(2011)
JACM
, vol.58
, Issue.6
, pp. 24
-
-
Gordon, S.D.1
Hazay, C.2
Katz, J.3
Lindell, Y.4
-
10
-
-
4544353942
-
A general completeness theorem for two-party games
-
Kilian, J.: A general completeness theorem for two-party games. In: 23rd STOC, pp. 553-560 (1991)
-
(1991)
23rd STOC
, pp. 553-560
-
-
Kilian, J.1
-
11
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: The 21st STOC, pp. 73-85 (1989)
-
(1989)
The 21st STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
13
-
-
0022882770
-
How to generate and exchange secrets
-
extended abstract
-
Yao, A.: How to generate and exchange secrets (extended abstract). In: The 27th FOCS, pp. 162-167 (1986)
-
(1986)
The 27th FOCS
, pp. 162-167
-
-
Yao, A.1
|