-
1
-
-
84933507780
-
Efficient multiparty protocols using circuit randomization
-
LNCS 576 Springer-Verlag
-
D. Beaver. Efficient multiparty protocols using circuit randomization. In CRYPTO '91, LNCS 576, pages 420-432. Springer-Verlag, 1992.
-
(1992)
CRYPTO '91
, pp. 420-432
-
-
Beaver, D.1
-
4
-
-
33746088658
-
Efficient multiparty computations secure against an adaptive adversary
-
LNCS 1592. Springer-Verlag
-
R. Cramer, I. Damgard, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations secure against an adaptive adversary. In EUROCRYPT '99, LNCS 1592. Springer-Verlag, 1999.
-
(1999)
EUROCRYPT '99
-
-
Cramer, R.1
Damgard, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
5
-
-
0002626155
-
General secure multi-party computation from any linear secret-sharing scheme
-
LNCS 1807. Springer-Verlag
-
R. Cramer, I. Damgaard, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In EUROCRYPT 2000, LNCS 1807. Springer-Verlag, 2000.
-
(2000)
EUROCRYPT 2000
-
-
Cramer, R.1
Damgaard, I.2
Maurer, U.3
-
6
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults (extended abstract)
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults (extended abstract). In 26th Annual Symposium on Foundations of Computer Science, pages 383-395, 1985.
-
(1985)
26th Annual Symposium on Foundations of Computer Science
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
7
-
-
84890519019
-
Secret sharing schemes with detection of cheaters for a general access structure
-
LNCS 1233
-
S. Cabello, C. Padró, and G. Sáez. Secret sharing schemes with detection of cheaters for a general access structure. In Proceedings of the 12th International Symposium on Fundamentals of Computation Theory, FCT '99, LNCS 1233, pages 185-193, 1999.
-
(1999)
Proceedings of the 12th International Symposium on Fundamentals of Computation Theory, FCT '99
, pp. 185-193
-
-
Cabello, S.1
Padró, C.2
Sáez, G.3
-
9
-
-
0030693496
-
Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)
-
M. Hirt and U. Maurer. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract). In 16th ACM Symposium on Principles of Distributed Computing, pages 25-34, 1997.
-
(1997)
16th ACM Symposium on Principles of Distributed Computing
, pp. 25-34
-
-
Hirt, M.1
Maurer, U.2
-
12
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority (extended abstract)
-
T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). In 21th Annual ACM Symposium on the Theory of Computing, pages 73-85, 1989.
-
(1989)
21th Annual ACM Symposium on the Theory of Computing
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
14
-
-
84983269168
-
Authentication theory/coding theory
-
LNCS 196 Springer-Verlag
-
G.J. Simmons. Authentication theory/coding theory. In CRYPTO '84, LNCS 196, pages 411-431. Springer-Verlag, 1985.
-
(1985)
CRYPTO '84
, pp. 411-431
-
-
Simmons, G.J.1
|