-
1
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
-
W. Aiello, Y. Ishai, O. Reingold, Priced oblivious transfer: How to sell digital goods. In Advances in Cryptology - EUROCRYPT’01. Lecture Notes in Computer Science, vol. 2045 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 2001), pp. 119-135
-
(2001)
Advances in Cryptology - EUROCRYPT’01
, vol.2045
, pp. 119-135
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
70350399649
-
Secure Evaluation of Private Linear Branching Programs with Medical Applications
-
Lecture Notes in Computer Science, Springer, Saint-Malo, France, 21-23
-
M. Barni, P. Failla, V. Kolesnikov, R. Lazzeretti, A.R. Sadeghi, T. Schneider, in Secure Evaluation of Private Linear Branching Programs with Medical Applications. European Symposium on Research in Computer Security (ESORICS’09). Lecture Notes in Computer Science, vol. 5789 (Springer, Saint-Malo, France, 21-23 Sept 2009), pp. 424-439
-
(2009)
European Symposium on Research in Computer Security (ESORICS’09)
, vol.5789
, pp. 424-439
-
-
Barni, M.1
Failla, P.2
Kolesnikov, V.3
Lazzeretti, R.4
Sadeghi, A.R.5
Schneider, T.6
-
3
-
-
0026206365
-
Circuit width, register allocation, and ordered binary decision diagrams
-
C.L. Berman, Circuit width, register allocation, and ordered binary decision diagrams. IEEE Trans. CAD 10(8), 1059-1066 (1991)
-
(1991)
IEEE Trans. CAD
, vol.10
, Issue.8
, pp. 1059-1066
-
-
Berman, C.L.1
-
4
-
-
0036038991
-
In Universally Composable Two-party and Multi-party Secure Computation
-
Montréal, Québec, Canada, 19-21
-
R. Canetti, Y. Lindell, R. Ostrovsky, A. Sahai, in Universally Composable Two-party and Multi-party Secure Computation. ACM Symposium on Theory of Computing (STOC’02), Montréal, Québec, Canada, 19-21 May 2002, pp. 494-503
-
(2002)
ACM Symposium on Theory of Computing (STOC’02)
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
5
-
-
27244440344
-
In A Very Compact S-box for AES
-
Edinburgh, UK, 29 Aug-1 Sept 2005. Lecture Notes in Computer Science, Springer
-
D. Canright, in A Very Compact S-box for AES. Cryptographic Hardware and Embedded Systems (CHES’05), Edinburgh, UK, 29 Aug-1 Sept 2005. Lecture Notes in Computer Science, vol. 3659 (Springer, 2005), pp. 441-456
-
(2005)
Cryptographic Hardware and Embedded Systems (CHES’05)
, vol.3659
, pp. 441-456
-
-
Canright, D.1
-
6
-
-
0019398205
-
Register allocation via coloring
-
G.J. Chaitin, M.A. Auslander, A.K. Chandra, J. Cocke, M.E. Hopkins, P.W. Markstein, Register allocation via coloring. Comput. Lang. 6(1), 47-57 (1981)
-
(1981)
Comput. Lang
, vol.6
, Issue.1
, pp. 47-57
-
-
Chaitin, G.J.1
Auslander, M.A.2
Chandra, A.K.3
Cocke, J.4
Hopkins, M.E.5
Markstein, P.W.6
-
7
-
-
44449151536
-
New constructions for UC secure computation using tamperpro of hardware
-
Istanbul, Turkey, 13-17, Lecture Notes in Computer Science, Springer
-
N. Chandran, V. Goyal, A. Sahai, New constructions for UC secure computation using tamperpro of hardware. in Advances in Cryptology - EUROCRYPT’08, Istanbul, Turkey, 13-17 Apr 2008. Lecture Notes in Computer Science, vol. 4965 (Springer, 2008), pp. 545-562
-
(2008)
In Advances in Cryptology - EUROCRYPT’08
, vol.4965
, pp. 545-562
-
-
Chandran, N.1
Goyal, V.2
Sahai, A.3
-
8
-
-
70350625407
-
In Universally Composable Multiparty Computation with Partially Isolated Parties
-
San Francisco, CA, USA, 15-17 Mar 2009. Lecture Notes in Computer Science, Springer
-
I. Damgård, J.B. Nielsen, D. Wichs, in Universally Composable Multiparty Computation with Partially Isolated Parties. Theory of Cryptography (TCC’09), San Francisco, CA, USA, 15-17 Mar 2009. Lecture Notes in Computer Science vol. 5444 (Springer, 2009), pp. 315-331
-
(2009)
Theory of Cryptography (TCC’09)
, vol.5444
, pp. 315-331
-
-
Damgård, I.1
Nielsen, J.B.2
Wichs, D.3
-
9
-
-
34548814766
-
In Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware Implementations
-
IEEE Computer Society
-
M. Feldhofer, J. Wolkerstorfer, in Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware Implementations. International Symposium on Circuits and Systems (ISCAS’07) (IEEE Computer Society, 2007), pp. 1839-1842
-
(2007)
International Symposium on Circuits and Systems (ISCAS’07)
, pp. 1839-1842
-
-
Feldhofer, M.1
Wolkerstorfer, J.2
-
10
-
-
33750232983
-
Trustedpals: Secure Multiparty Computation Implemented with Smart Cards
-
Hamburg, Germany, 18-20 Sept 2006. Lecture Notes in Computer Science
-
M. Fort, F.C. Freiling, L.D. Penso, Z. Benenson, D. Kesdogan, in Trustedpals: Secure Multiparty Computation Implemented with Smart Cards. European Symposium on Research in Computer Security (ESORICS’06), Hamburg, Germany, 18-20 Sept 2006. Lecture Notes in Computer Science, vol. 4189 (Springer, 2006), pp. 34-48
-
(2006)
European Symposium on Research in Computer Security (ESORICS’06)
, vol.4189
, pp. 34-48
-
-
Fort, M.1
Freiling, F.C.2
Penso, L.D.3
Benenson, Z.4
Kesdogan, D.5
-
11
-
-
70350381719
-
-
Google Health (2009). https://www.google.com/health
-
(2009)
Google Health
-
-
-
12
-
-
44449160882
-
Efficient two party and multi party computation against covert adversaries
-
Istanbul, Turkey, 13-17 Apr 2008. Lecture Notes in Computer Science, Springer
-
V. Goyal, P. Mohassel, A. Smith, Efficient two party and multi party computation against covert adversaries. in Advances in Cryptology - EUROCRYPT’08, Istanbul, Turkey, 13-17 Apr 2008. Lecture Notes in Computer Science, vol. 4965 (Springer, 2008), pp. 289-306
-
(2008)
in Advances in Cryptology - EUROCRYPT’08
, vol.4965
, pp. 289-306
-
-
Goyal, V.1
Mohassel, P.2
Smith, A.3
-
13
-
-
54249137843
-
In Generalized Non-interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
-
Cozumel, Mexico, 28-31 Jan 2008. Lecture Notes in Computer Science
-
V. Gunupudi, S. Tate, in Generalized Non-interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents. Financial Cryptography and Data Security (FC’08), Cozumel, Mexico, 28-31 Jan 2008. Lecture Notes in Computer Science, vol. 5143 (Springer, 2008), pp. 98-112
-
(2008)
Financial Cryptography and Data Security (FC’08)
, vol.5143
, pp. 98-112
-
-
Gunupudi, V.1
Tate, S.2
-
14
-
-
70349276910
-
In Constructions of Truly Practical Secure Protocols Using Standard Smartcards
-
New York, NY, USA
-
C. Hazay, Y. Lindell, in Constructions of Truly Practical Secure Protocols Using Standard Smartcards. ACM Conference on Computer and Communications Security (CCS’08) (ACM, New York, NY, USA 2008), pp. 491-500
-
(2008)
ACM Conference on Computer and Communications Security (CCS’08) (ACM
, pp. 491-500
-
-
Hazay, C.1
Lindell, Y.2
-
15
-
-
38049039055
-
Universally Composable Zero-Knowledge Arguments and Commitments from Signature Cards
-
Brno, The Czech Republic, 15-17
-
D. Hofheinz, J. Müller-Quade, D. Unruh, in Universally Composable Zero-Knowledge Arguments and Commitments from Signature Cards. Central European Conference on Cryptology (MoraviaCrypt’05), Brno, The Czech Republic, 15-17 June 2005
-
(2005)
Central European Conference on Cryptology (MoraviaCrypt’05)
-
-
Hofheinz, D.1
Müller-Quade, J.2
Unruh, D.3
-
16
-
-
33750228085
-
More Efficient Secure Function Evaluation Using Tiny Trusted Third Parties
-
Hanover, NH, URL
-
A. Iliev, S. Smith, More Efficient Secure Function Evaluation Using Tiny Trusted Third Parties. Technical Report TR2005-551, Dartmouth College, Computer Science, Hanover, NH (2005). URL http://www.cs.dartmouth.edu/reports/TR2005-551.pdf
-
(2005)
Technical Report TR2005-551, Dartmouth College, Computer Science
-
-
Iliev, A.1
Smith, S.2
-
17
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
-
Y. Ishai, J. Kilian, K. Nissim, E. Petrank, Extending oblivious transfers efficiently. in Advances in Cryptology - CRYPTO’03. Lecture Notes in Computer Science, vol. 2729 (Springer-Verlag, Berlin, Heidelberg, New York, NY 2003) pp. 145-161
-
(2003)
Advances in Cryptology - CRYPTO’03
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
18
-
-
77955312868
-
Embedded SFE: Offloading Server and Network Using Hardware Tokens
-
Lecture Notes in Computer Science, Springer, Jan
-
K. Järvinen, V. Kolesnikov, A.-R. Sadeghi, T. Schneider, in Embedded SFE: Offloading Server and Network Using Hardware Tokens. In 14th International Conference on Financial Cryptography and Data Security (FC’10). Lecture Notes in Computer Science vol. 6052 (Springer, Jan 2010) pp. 207-221
-
(2010)
14Th International Conference on Financial Cryptography and Data Security (FC’10)
, vol.6052
, pp. 207-221
-
-
Järvinen, K.1
Kolesnikov, V.2
Sadeghi, A.-R.3
Schneider, T.4
-
19
-
-
38049150653
-
Universally composable multi-party computation using tamper-proof hardware
-
Barcelona, Spain, 20-24 May 2007. Lecture Notes in Computer Science, Springer
-
J. Katz, Universally composable multi-party computation using tamper-proof hardware. In Advances in Cryptology - EUROCRYPT’07, Barcelona, Spain, 20-24 May 2007. Lecture Notes in Computer Science, vol. 4515 (Springer, 2007), pp. 115-128
-
(2007)
Advances in Cryptology - EUROCRYPT’07
, vol.4515
, pp. 115-128
-
-
Katz, J.1
-
20
-
-
49049099825
-
In Improved Garbled Circuit: Free XOR Gates and Applications
-
Reykjavik, Iceland, 6-13 July 2008. Lecture Notes in Computer Science, Springer
-
V. Kolesnikov, T. Schneider, in Improved Garbled Circuit: Free XOR Gates and Applications. International Colloquium on Automata, Languages and Programming (ICALP’08), Reykjavik, Iceland, 6-13 July 2008. Lecture Notes in Computer Science, vol. 5126 (Springer, 2008), pp. 486-498
-
(2008)
International Colloquium on Automata, Languages and Programming (ICALP’08)
, vol.5126
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
22
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Spain, 20-24, Lecture Notes in Computer Science, (Springer, 2007)
-
Y. Lindell, B. Pinkas, An efficient protocol for secure two-party computation in the presence of malicious adversaries. in Advances in Cryptology - EUROCRYPT’07 Barcelona, Spain, 20-24 May 2007. Lecture Notes in Computer Science, vol. 4515 (Springer, 2007), pp. 52-78
-
(2007)
Advances in Cryptology - EUROCRYPT’07 Barcelona
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
23
-
-
64249101946
-
A proof of Yao’s protocol for secure two-party computation
-
Cryptology ePrint Archive, Report 2004/175
-
Y. Lindell, B. Pinkas, A proof of Yao’s protocol for secure two-party computation. J. Cryptol. 22(2), 161-188 (2009). Cryptology ePrint Archive, Report 2004/175, http://eprint.iacr.org
-
(2009)
J. Cryptol
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
24
-
-
52149120767
-
In Implementing Two-party Computation Efficiently with Security Against Malicious Adversaries
-
Amalfi, Italy, 10-12, Lecture Notes in Computer Science, (Springer, 2008)
-
Y. Lindell, B. Pinkas, N. Smart, in Implementing Two-party Computation Efficiently with Security Against Malicious Adversaries. Security and Cryptography for Networks (SCN’08), Amalfi, Italy, 10-12 Sept 2008. Lecture Notes in Computer Science, vol. 5229 (Springer, 2008), pp. 2-20
-
(2008)
Security and Cryptography for Networks (SCN’08
, vol.5229
, pp. 2-20
-
-
Lindell, Y.1
Pinkas, B.2
Smart, N.3
-
25
-
-
85084163840
-
Fairplay -A Secure Two-party Computation System
-
San Diego, CA, USA, 9-13 Aug 2004, USENIX Association
-
D. Malkhi, N. Nisan, B. Pinkas, Y. Sella, in Fairplay -A Secure Two-party Computation System. USENIX Security Symposium (Security’04), San Diego, CA, USA, 9-13 Aug 2004 (USENIX Association, 2004)
-
(2004)
USENIX Security Symposium (Security’04)
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
26
-
-
44449101614
-
David and goliath commitments: UC computation for asymmetric parties using tamper-proof hardware
-
Istanbul, Turkey, 13-17 Apr 2008. Lecture Notes in Computer Science, Springer
-
T. Moran, G. Segev, David and goliath commitments: UC computation for asymmetric parties using tamper-proof hardware. in Advances in Cryptology - EUROCRYPT’08, Istanbul, Turkey, 13-17 Apr 2008. Lecture Notes in Computer Science, vol. 4965 (Springer, 2008), pp. 527-544
-
(2008)
Advances in Cryptology - EUROCRYPT’08
, vol.4965
, pp. 527-544
-
-
Moran, T.1
Segev, G.2
-
27
-
-
64049119146
-
In Efficient Oblivious Transfer Protocols
-
Washington, DC, USA, 7-9, (Society for Industrial and Applied Mathematics, 2001)
-
M. Naor, B. Pinkas, in Efficient Oblivious Transfer Protocols. ACM-SIAM Symposium On Discrete Algorithms (SODA’01), Washington, DC, USA, 7-9 Jan 2001. (Society for Industrial and Applied Mathematics, 2001), pp. 448-457
-
(2001)
ACM-SIAM Symposium on Discrete Algorithms (SODA’01)
, pp. 448-457
-
-
Naor, M.1
Pinkas, B.2
-
28
-
-
33645492588
-
-
Advanced Encryption Standard (AES)
-
NIST, U.S. National Institute of Standards and Technology: Federal information processing standards (FIPS 197). Advanced Encryption Standard (AES) (2001). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
-
(2001)
Federal Information Processing Standards (FIPS 197)
-
-
-
29
-
-
85019718769
-
Federal information processing standards (FIPS 180-2)
-
NIST, U.S. National Institute of Standards and Technology: Federal information processing standards (FIPS 180-2). Announcing the Secure Hash Standard (2002). http://csrc.nist.gov/publications/fips/fips180-2/fips-180-2.pdf
-
(2002)
Announcing the Secure Hash Standard
-
-
-
30
-
-
72449131818
-
Secure two-party computation is practical. In Advances in Cryptology - ASIACRYPT 2009, Tokyo, Japan, 6-10
-
(Springer, 2009)
-
B. Pinkas, T. Schneider, N.P. Smart, S.C. Williams, Secure two-party computation is practical. in Advances in Cryptology - ASIACRYPT 2009, Tokyo, Japan, 6-10 Dec 2009. Lecture Notes in Computer Science, vol. 5912 (Springer, 2009), pp. 250-267
-
(2009)
Lecture Notes in Computer Science
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
31
-
-
84938487169
-
The synthesis of two-terminal switching circuits
-
C.E. Shannon, The synthesis of two-terminal switching circuits. Bell Syst. Tech. J. 28(1), 59-98 (1949)
-
(1949)
Bell Syst. Tech. J
, vol.28
, Issue.1
, pp. 59-98
-
-
Shannon, C.E.1
-
33
-
-
85056434102
-
-
(eds.), CRC Press, Boca Raton, FL
-
Y.N. Srikant, P. Shankar (eds.), The Compiler Design Handbook: Optimizations and Machine Code Generation (CRC Press, Boca Raton, FL, 2002)
-
(2002)
The Compiler Design Handbook: Optimizations and Machine Code Generation
-
-
Srikant, Y.N.1
Shankar, P.2
-
34
-
-
70350754104
-
In Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology
-
Concordia University, Montreal, Canada, 12-15, Lecture Notes in Computer Science, (Springer, 2009)
-
S. Tate, R. Vishwanathan, in Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology. Data and Applications Security (DBSec’09), Concordia University, Montreal, Canada, 12-15 July 2009. Lecture Notes in Computer Science, vol. 5645 (Springer, 2009), pp. 252-267
-
(2009)
Data and Applications Security (DBSec’09)
, vol.5645
, pp. 252-267
-
-
Tate, S.1
Vishwanathan, R.2
-
35
-
-
0030087056
-
Extending Quine-McCluskey for exclusive-or logic synthesis
-
B.C.H. Turton, Extending Quine-McCluskey for exclusive-or logic synthesis. IEEE Trans. Educ. 39, 81-85 (1996)
-
(1996)
IEEE Trans. Educ
, vol.39
, pp. 81-85
-
-
Turton, B.C.H.1
-
36
-
-
0022882770
-
In How to Generate and Exchange Secrets
-
Toronto, Canada, 27-29, (IEEE, 1986)
-
A.C. Yao, in How to Generate and Exchange Secrets. IEEE Symposium on Foundations of Computer Science (FOCS’86), Toronto, Canada, 27-29 Oct 1986 (IEEE, 1986), pp. 162-167
-
(1986)
IEEE Symposium on Foundations of Computer Science (FOCS’86)
, pp. 162-167
-
-
Yao, A.C.1
|