-
1
-
-
0029702967
-
Correlated pseudorandomness and the complexity of private computations
-
ACM
-
Beaver, D.: Correlated pseudorandomness and the complexity of private computations. In: STOC 1996, pp. 479-488. ACM (1996)
-
(1996)
STOC 1996
, pp. 479-488
-
-
Beaver, D.1
-
2
-
-
70350379222
-
Secure multiparty computation goes live
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
-
Bogetoft, P., et al.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325-343. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5628
, pp. 325-343
-
-
Bogetoft, P.1
-
4
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
ACM
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC 1987, pp. 218-229. ACM (1987)
-
(1987)
STOC 1987
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
5
-
-
44449160882
-
Efficient two party and multi party computation against covert adversaries
-
DOI 10.1007/978-3-540-78967-3-17, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Goyal, V., Mohassel, P., Smith, A.: Efficient two party and multi party computation against covert adversaries. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 289-306. Springer, Heidelberg (2008) (Pubitemid 351762836)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 289-306
-
-
Goyal, V.1
Mohassel, P.2
Smith, A.3
-
6
-
-
78649992236
-
Tasty: Tool for automating secure two-party computations
-
ACM
-
Henecka, W., Kögl, S., Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: Tasty: tool for automating secure two-party computations. In: ACM Conference on Computer and Communications Security, pp. 451-462. ACM (2010)
-
(2010)
ACM Conference on Computer and Communications Security
, pp. 451-462
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
7
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: USENIX Security Symposium (2011)
-
USENIX Security Symposium (2011)
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
8
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
9
-
-
51849102397
-
Founding cryptography on oblivious transfer - efficiently
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer - efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 572-591
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
10
-
-
80755188493
-
From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design
-
Report 2010/079
-
Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design. Cryptology ePrint Archive, Report 2010/079 (2010), http://eprint.iacr.org/
-
(2010)
Cryptology ePrint Archive
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
11
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
Aceto, L., Damg?ard, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
-
Kolesnikov, V., Schneider, T.: Improved garbled circuit: Free XOR gates and applications. In: Aceto, L., Damg?ard, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
12
-
-
84889076745
-
Billion-gate secure computation with malicious adversaries
-
USENIX
-
Kreuter, B., Shelat, A., Shen, C.-H.: Billion-gate secure computation with malicious adversaries. In: 21th USENIX Conference on Security Symposium, p. 14. USENIX (2012)
-
(2012)
21th USENIX Conference on Security Symposium
, pp. 14
-
-
Kreuter, B.1
Shelat, A.2
Shen, C.-H.3
-
13
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
14
-
-
64249101946
-
A proof of security of yao's protocol for two-party computation
-
Lindell, Y., Pinkas, B.: A proof of security of yao's protocol for two-party computation. J. Cryptology 22(2), 161-188 (2009)
-
(2009)
J. Cryptology
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
15
-
-
79953241261
-
Secure two-party computation via cut-and-choose oblivious transfer
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: Secure two-party computation via cut-and-choose oblivious transfer. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 329-346. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 329-346
-
-
Lindell, Y.1
Pinkas, B.2
-
16
-
-
0025661864
-
The computational complexity of universal hashing
-
IEEE
-
Mansour, Y., Nisan, N., Tiwari, P.: The computational complexity of universal hashing. In: Structure in Complexity Theory Conference, p. 90. IEEE (1990)
-
(1990)
Structure in Complexity Theory Conference
, pp. 90
-
-
Mansour, Y.1
Nisan, N.2
Tiwari, P.3
-
17
-
-
84883898504
-
Privacy preserving auctions and mechanism design
-
ACM
-
Naor, M., Pinkas, B., Sumner, R.: Privacy preserving auctions and mechanism design. In: ACM Conference on Electronic Commerce, pp. 129-139. ACM (1999)
-
(1999)
ACM Conference on Electronic Commerce
, pp. 129-139
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
18
-
-
84865506559
-
A new approach to practical active-secure two-party computation
-
Safavi-Naini, R. (ed.) CRYPTO 2012. Springer, Heidelberg
-
Nielsen, J.B., Nordholt, P.S., Orlandi, C., Burra, S.S.: A new approach to practical active-secure two-party computation. In: Safavi-Naini, R. (ed.) CRYPTO 2012. LNCS, vol. 7417, pp. 681-700. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7417
, pp. 681-700
-
-
Nielsen, J.B.1
Nordholt, P.S.2
Orlandi, C.3
Burra, S.S.4
-
19
-
-
70350634167
-
LEGO for two-party secure computation
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Nielsen, J.B., Orlandi, C.: LEGO for two-party secure computation. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 368-386. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 368-386
-
-
Nielsen, J.B.1
Orlandi, C.2
-
20
-
-
84875979853
-
High-performance symmetric block ciphers on multicore CPU and GPUs
-
Nishikawa, N., Iwai, K., Kurokawa, T.: High-performance symmetric block ciphers on multicore CPU and GPUs. International Journal of Networking and Computing 2(2) (2012)
-
(2012)
International Journal of Networking and Computing
, vol.2
, Issue.2
-
-
Nishikawa, N.1
Iwai, K.2
Kurokawa, T.3
-
21
-
-
72449131818
-
Secure two-party computation is practical
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure two-party computation is practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
22
-
-
84865821050
-
Fastplay-a parallelization model and implementation of SMC on cuda based GPU cluster architecture
-
Pu, S., Duan, P., Liu, J.-C.: Fastplay-a parallelization model and implementation of SMC on cuda based GPU cluster architecture. IACR Cryptology ePrint Archive, 2011:97 (2011)
-
(2011)
IACR Cryptology ePrint Archive
, vol.2011
, pp. 97
-
-
Pu, S.1
Duan, P.2
Liu, J.-C.3
-
23
-
-
79958017670
-
Two-Output Secure Computation with Malicious Adversaries
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Shelat, A., Shen, C.-H.: Two-Output Secure Computation with Malicious Adversaries. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 386-405. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 386-405
-
-
Shelat, A.1
Shen, C.-H.2
-
24
-
-
84879852395
-
ECDLP on GPU
-
Xu, L., Lin, D., Zou, J.: ECDLP on GPU. IACR Cryptology ePrint Archive, 2011:146 (2011)
-
(2011)
IACR Cryptology ePrint Archive
, vol.2011
, pp. 146
-
-
Xu, L.1
Lin, D.2
Zou, J.3
-
25
-
-
0020312165
-
Protocols for secure computations
-
IEEE
-
Yao, A.C.: Protocols for secure computations. In: FOCS 1982, pp. 160-164. IEEE (1982)
-
(1982)
FOCS 1982
, pp. 160-164
-
-
Yao, A.C.1
|