-
1
-
-
0009011118
-
Bounded-width polynomial-size branching programs recognize exactly those languages in NC
-
Barrington, D. A. M., "Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC1, " STOC 1986.
-
(1986)
STOC
-
-
Barrington, D.A.M.1
-
2
-
-
1842704832
-
Forwarding in a content-based network
-
Carzaniga, A. and Wolf, A. L., "Forwarding in a Content-Based Network, " ACM SIGCOMM, 2003.
-
(2003)
ACM SIGCOMM
-
-
Carzaniga, A.1
Wolf, A.L.2
-
3
-
-
0022080529
-
A randomized protocol for signing contracts
-
Jun
-
Even, S., Goldreich, O. and Lempel, A., "A Randomized Protocol for Signing Contracts, " CACM, Jun 1985.
-
(1985)
CACM
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
4
-
-
0027986369
-
A minimal model for secure computation
-
Feige, U., Kilian, J. and Naor, M., "A Minimal Model for Secure Computation, " STOC 1994.
-
(1994)
STOC
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
5
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Gentry, C., "Fully Homomorphic Encryption using Ideal Lattices, " STOC 2009.
-
(2009)
STOC
-
-
Gentry, C.1
-
6
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Huang, Y., Evans, D., Katz, J., and Malka, l., "Faster Secure Two-Party Computation Using Garbled Circuits, " USENIX Security Symposium, 2011.
-
(2011)
USENIX Security Symposium
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
7
-
-
80755188493
-
From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design
-
Kolesnikov, V., Sadeghi, A.-R. and Schneider, T., "From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design, " Cryptology ePrint Archive, Report 2010/079, 2010.
-
(2010)
Cryptology EPrint Archive, Report 2010/079
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
8
-
-
79951660868
-
Policy-agile encrypted networks via secure function computation
-
Krishnan, R. and Sundaram, R., "Policy-agile Encrypted Networks Via Secure Function Computation, " MILCOM 2010.
-
(2010)
MILCOM
-
-
Krishnan, R.1
Sundaram, R.2
-
9
-
-
1342297764
-
Oblivious transfer with adaptive queries
-
Naor, M., Pinkas, B., "Oblivious transfer with adaptive queries, " CRYPTO 1999.
-
(1999)
CRYPTO
-
-
Naor, M.1
Pinkas, B.2
-
10
-
-
84881145650
-
Section 15.3: The class NC
-
(1st ed.), Addison Wesley, ISBN 0-201-53082-1
-
Papadimitriou, C., "Section 15.3: The class NC, " Computational Complexity (1st ed.), Addison Wesley, pp. 375- 381, ISBN 0-201-53082-1, 1993.
-
(1993)
Computational Complexity
, pp. 375-381
-
-
Papadimitriou, C.1
-
11
-
-
0002659010
-
How to explain zero-knowledge protocols to your children
-
Quisquater, J.-J., Guillou, L., Annick, M., Berson, T., "How to explain zero-knowledge protocols to your children, " CRYPTO 1989.
-
(1989)
CRYPTO
-
-
Quisquater, J.-J.1
Guillou, L.2
Annick, M.3
Berson, T.4
-
12
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Rabin, M. O., "How to exchange secrets by oblivious transfer, " Tech Report TR-81, Harvard U., 1981.
-
(1981)
Tech Report TR-81, Harvard U
-
-
Rabin, M.O.1
-
13
-
-
50049089599
-
Enabling confidentiality in content-based publish/subscribe infrastructures
-
Raiciu C., and Rosenblum, D. S., "Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures, " SecureComm 2006.
-
(2006)
SecureComm
-
-
Raiciu, C.1
Rosenblum, D.S.2
-
14
-
-
33746327374
-
-
Foundations of Secure Computation
-
Rivest, R. L., Adleman, L. and Dertouzos, M. L., "On data banks and privacy homomorphisms, " Foundations of Secure Computation, 1978.
-
(1978)
On Data Banks and Privacy Homomorphisms
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
16
-
-
0020312165
-
Protocols for secure computations
-
Yao, A. C., "Protocols for secure computations, " FOCS 1982.
-
(1982)
FOCS
-
-
Yao, A.C.1
-
17
-
-
0022882770
-
How to generate and exchange secrets
-
Yao, A.C., "How to Generate and Exchange Secrets, " FOCS 1986.
-
(1986)
FOCS
-
-
Yao, A.C.1
|