-
1
-
-
0002531104
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," in ACM STOC, 1988.
-
(1988)
ACM STOC
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
2
-
-
77954592905
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in ACM STOC, 2009.
-
(2009)
ACM STOC
-
-
Gentry, C.1
-
4
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology - EUROCRYPT '99. Springer, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT '99
-
-
Paillier, P.1
-
5
-
-
70349309809
-
On lattices, learning with errors, random linear codes, and cryptography
-
O. Regev, "On lattices, learning with errors, random linear codes, and cryptography," J. ACM, vol. 56, no. 6, 2009.
-
(2009)
J. ACM
, vol.56
, Issue.6
-
-
Regev, O.1
-
6
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
USENIX Association
-
Y. Huang, D. Evans, J. Katz, and L. Malka, "Faster secure two-party computation using garbled circuits," in 20th USENIX Security Symposium. USENIX Association, 2011.
-
(2011)
20th USENIX Security Symposium
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
8
-
-
80955145180
-
Secure multiple linear regression based on homomorphic encryption
-
R. Hall, S. E. Fienberg, and Y. Nardi, "Secure multiple linear regression based on homomorphic encryption," J. Official Statistics, vol. 27, no. 4, 2011.
-
(2011)
J. Official Statistics
, vol.27
, Issue.4
-
-
Hall, R.1
Fienberg, S.E.2
Nardi, Y.3
-
9
-
-
73849126104
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
Y. Aumann and Y. Lindell, "Security against covert adversaries: Efficient protocols for realistic adversaries," J. Cryptology, vol. 23, no. 2, 2010.
-
(2010)
J. Cryptology
, vol.23
, Issue.2
-
-
Aumann, Y.1
Lindell, Y.2
-
10
-
-
85071736958
-
Communication complexity of secure computation
-
M. K. Franklin and M. Yung, "Communication complexity of secure computation," in ACM STOC, 1992.
-
(1992)
ACM STOC
-
-
Franklin, M.K.1
Yung, M.2
-
11
-
-
0003684449
-
-
2nd ed. Springer
-
J. Friedman, T. Hastie, and R. Tibshirani, The Elements of Statistical Learning: Data Mining, Inference and Prediction, 2nd ed. Springer, 2009.
-
(2009)
The Elements of Statistical Learning: Data Mining, Inference and Prediction
-
-
Friedman, J.1
Hastie, T.2
Tibshirani, R.3
-
12
-
-
64249101946
-
A proof of security of Yao's protocol for two-party computation
-
Y. Lindell and B. Pinkas, "A proof of security of Yao's protocol for two-party computation," J. Cryptology, vol. 22, no. 2, 2009.
-
(2009)
J. Cryptology
, vol.22
, Issue.2
-
-
Lindell, Y.1
Pinkas, B.2
-
14
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts," Commun. ACM, vol. 28, no. 6, 1985.
-
(1985)
Commun. ACM
, vol.28
, Issue.6
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
15
-
-
85084163840
-
Fairplay - Secure two-party computation system
-
USENIX Association
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, "Fairplay - Secure two-party computation system," in 13th USENIX Security Symposium. USENIX Association, 2004.
-
(2004)
13th USENIX Security Symposium
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
17
-
-
0002908662
-
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
-
Springer
-
I. Damgård and M. Jurik, "A generalisation, a simplification and some applications of Paillier's probabilistic public-key system," in Public-Key Cryptography - PKC 2001. Springer, 2001.
-
(2001)
Public-Key Cryptography - PKC 2001
-
-
Damgård, I.1
Jurik, M.2
-
18
-
-
0000845043
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
T. P. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing," in CRYPTO'91, 1992.
-
(1992)
CRYPTO'91
-
-
Pedersen, T.P.1
-
19
-
-
0011390710
-
Proving in zero-knowledge that a number is the product of two safe primes
-
Springer
-
J. Camenisch and M. Michels, "Proving in zero-knowledge that a number is the product of two safe primes," in Advances in Cryptology - EUROCRYPT '99. Springer, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT '99
-
-
Camenisch, J.1
Michels, M.2
-
20
-
-
0002681959
-
Untraceable off-line cash in wallets with observers
-
Springer
-
S. Brands, "Untraceable off-line cash in wallets with observers," in CRYPTO'93. Springer, 1994.
-
(1994)
CRYPTO'93
-
-
Brands, S.1
-
21
-
-
0001853827
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Springer
-
R. Cramer, I. Damgård, and B. Schoenmakers, "Proofs of partial knowledge and simplified design of witness hiding protocols," in CRYPTO'94. Springer, 1994.
-
(1994)
CRYPTO'94
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
22
-
-
0000097412
-
How to prove yourself: Practical solutions to identification and signature problems
-
Springer
-
A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems," in CRYPTO'86. Springer, 1987.
-
(1987)
CRYPTO'86
-
-
Fiat, A.1
Shamir, A.2
-
23
-
-
79960854270
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Springer
-
R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers," in CRYPTO 2010. Springer, 2010.
-
(2010)
CRYPTO 2010
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
25
-
-
72449131818
-
Secure two-party computation is practical
-
Springer
-
B. Pinkas, T. Schneider, N. P. Smart, and S. C. Williams, "Secure two-party computation is practical," in Advances in Cryptology - ASIACRYPT 2009. Springer, 2009.
-
(2009)
Advances in Cryptology - ASIACRYPT 2009
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
26
-
-
52249111886
-
Extending oblivious transfers efficiently
-
Springer
-
Y. Ishai, J. Kilian, K. Nissim, and E. Petrank, "Extending oblivious transfers efficiently," in CRYPTO 2003. Springer, 2003.
-
(2003)
CRYPTO 2003
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
28
-
-
78649992236
-
TASTY: Tool for automating secure two-party computations
-
ACM Press
-
W. Henecka, S. K. ögl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg, "TASTY: tool for automating secure two-party computations," in 17th ACM Conference on Computer and Communications Security (CCS). ACM Press, 2010.
-
(2010)
17th ACM Conference on Computer and Communications Security (CCS)
-
-
Henecka, W.1
Ögl, S.K.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
31
-
-
84889076745
-
Billion-gate secure computation with malicious adversaries
-
USENIX Association
-
B. Kreuter, A. Shelat, and C.-H. Shen, "Billion-gate secure computation with malicious adversaries," in 21st USENIX Security Symposium. USENIX Association, 2012.
-
(2012)
21st USENIX Security Symposium
-
-
Kreuter, B.1
Shelat, A.2
Shen, C.-H.3
-
32
-
-
84881219762
-
Implementing two-party computation efficiently with security against malicious adversaries
-
Springer
-
Y. Lindell, B. Pinkas, and N. P. Smart, "Implementing two-party computation efficiently with security against malicious adversaries," in Security and Cryptography for Networks (SCN). Springer, 2008.
-
(2008)
Security and Cryptography for Networks (SCN)
-
-
Lindell, Y.1
Pinkas, B.2
Smart, N.P.3
-
33
-
-
84954474682
-
Efficiency tradeoffs for malicious two-party computation
-
Springer
-
P. Mohassel and M. Franklin, "Efficiency tradeoffs for malicious two-party computation," in Public-Key Cryptography (PKC). Springer, 2006.
-
(2006)
Public-Key Cryptography (PKC)
-
-
Mohassel, P.1
Franklin, M.2
-
34
-
-
0003474751
-
-
3rd ed. Cambridge University Press
-
W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery, Numerical Recipes: The Art of Scientific Computing, 3rd ed. Cambridge University Press, 2007.
-
(2007)
Numerical Recipes: The Art of Scientific Computing
-
-
Press, W.H.1
Teukolsky, S.A.2
Vetterling, W.T.3
Flannery, B.P.4
-
36
-
-
0034312453
-
Minimal-storage high-performance Cholesky factorization via blocking and recursion
-
F. G. Gustavson and I. Jonsson, "Minimal-storage high-performance Cholesky factorization via blocking and recursion," IBM J. Res. Dev., vol. 44, 2000.
-
(2000)
IBM J. Res. Dev.
, vol.44
-
-
Gustavson, F.G.1
Jonsson, I.2
-
38
-
-
84881227777
-
Semuninumerical Algorithms
-
3rd ed. Addison-Wesley
-
D. E. Knuth, The Art of Computer Programming, Vol. 2, Semuninumerical Algorithms, 3rd ed. Addison-Wesley, 1997.
-
(1997)
The Art of Computer Programming
, vol.2
-
-
Knuth, D.E.1
-
40
-
-
84881222587
-
Privacy preserving regression modelling via distributed computation
-
A. P. Sanil, A. F. Karr, X. Lin, and J. P. Reiter, "Privacy preserving regression modelling via distributed computation," in ACM KDD, 2004.
-
(2004)
ACM KDD
-
-
Sanil, A.P.1
Karr, A.F.2
Lin, X.3
Reiter, J.P.4
-
45
-
-
20744460179
-
Secure regression on distributed databases
-
A. F. Karr, X. Lin, A. P. Sanil, and J. P. Reiter, "Secure regression on distributed databases," J. Computational and Graphical Statistics, vol. 14, no. 2, 2005.
-
(2005)
J. Computational and Graphical Statistics
, vol.14
, Issue.2
-
-
Karr, A.F.1
Lin, X.2
Sanil, A.P.3
Reiter, J.P.4
-
46
-
-
34548082549
-
Secure, privacy-preserving analysis of distributed databases
-
A. F. Karr, W. J. Fulp, F. Vera, S. S. Young, X. Lin, and J. P. Reiter, "Secure, privacy-preserving analysis of distributed databases," Technometrics, vol. 49, no. 3, 2007.
-
(2007)
Technometrics
, vol.49
, Issue.3
-
-
Karr, A.F.1
Fulp, W.J.2
Vera, F.3
Young, S.S.4
Lin, X.5
Reiter, J.P.6
-
47
-
-
77349092141
-
Privacy-preserving analysis of vertically partitioned data using secure matrix products
-
A. F. Karr, X. Lin, A. P. Sanil, and J. P. Reiter, "Privacy- preserving analysis of vertically partitioned data using secure matrix products," J. Official Statistics, vol. 25, no. 1, 2009.
-
(2009)
J. Official Statistics
, vol.25
, Issue.1
-
-
Karr, A.F.1
Lin, X.2
Sanil, A.P.3
Reiter, J.P.4
-
51
-
-
78149277563
-
Efficient privacy-preserving face recognition
-
Springer
-
A.-R. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient privacy-preserving face recognition," in Information, Security and Cryptology - ICISC 2009. Springer, 2010.
-
(2010)
Information, Security and Cryptology - ICISC 2009
-
-
Sadeghi, A.-R.1
Schneider, T.2
Wehrenberg, I.3
-
52
-
-
84923318201
-
Efficient privacy-preserving biometric identification
-
The Internet Society
-
Y. Huang, L. Malka, D. Evans, and J. Katz, "Efficient privacy-preserving biometric identification," in Network and Distributed System Security Symposium (NDSS 2011). The Internet Society, 2011.
-
(2011)
Network and Distributed System Security Symposium (NDSS 2011)
-
-
Huang, Y.1
Malka, L.2
Evans, D.3
Katz, J.4
-
53
-
-
33746437508
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas, "Privacy preserving data mining," J. Cryptology, vol. 15, no. 3, 2002.
-
(2002)
J. Cryptology
, vol.15
, Issue.3
-
-
Lindell, Y.1
Pinkas, B.2
-
55
-
-
84881242599
-
Differential privacy and robust statistics
-
C. Dwork and J. Lei, "Differential privacy and robust statistics," in ACM STOC, 2009.
-
(2009)
ACM STOC
-
-
Dwork, C.1
Lei, J.2
-
56
-
-
84881225673
-
Differentially private recommender systems: Building privacy into the Netflix prize contenders
-
F. McSherry and I. Mironov, "Differentially private recommender systems: Building privacy into the Netflix prize contenders," in ACM KDD, 2009.
-
(2009)
ACM KDD
-
-
McSherry, F.1
Mironov, I.2
|