-
2
-
-
80053944821
-
Using compilers to enhance cryptographic product development
-
Seiten, Vieweg+Teubner
-
E. Bangerter, M. Barbosa, D.J. Bernstein, I. Damgard, D. Page, J.I. Pagter, A.-R. Sadeghi und S. Sovio. Using Compilers to Enhance Cryptographic Product Development. In Information Security Solutions Europe (ISSE'10), Seiten 291-301. Vieweg+Teubner, 2010.
-
(2010)
Information Security Solutions Europe (ISSE'10)
, pp. 291-301
-
-
Bangerter, E.1
Barbosa, M.2
Bernstein, D.J.3
Damgard, I.4
Page, D.5
Pagter, J.I.6
Sadeghi, A.-R.7
Sovio, U.S.8
-
3
-
-
0027851984
-
Time series modeling of heart rate dynamics
-
Proceedings. Seiten
-
F. M. Bennett, D. J. Christini, H. Ahmed, K. Lutchen, J. M. Hausdorff und N. Oriol. Time series modeling of heart rate dynamics. In Computers in Cardiology 1993. Proceedings., Seiten 273-276, 1993.
-
(1993)
Computers in Cardiology 1993
, pp. 273-276
-
-
Bennett, F.M.1
Christini, D.J.2
Ahmed, H.3
Lutchen, K.4
Hausdorff, J.M.5
Oriol, N.6
-
5
-
-
84928743703
-
Precomputing oblivious transfer
-
LNCS, Band 963, Seiten, Springer
-
D. Beaver. Precomputing Oblivious Transfer. In Advances in Cryptology - CRYPTO' 95, LNCS, Band 963, Seiten 97-109. Springer, 1995.
-
(1995)
Advances in Cryptology - CRYPTO' 95
, pp. 97-109
-
-
Beaver, D.1
-
6
-
-
77949846904
-
Efficient privacy-preserving classification of ECG signals
-
Seiten, IEEE
-
M. Barni, P. Failla, V. Kolesnikov, R. Lazzeretti, A. Paus, A.-R. Sadeghi und T. Schneider. Efficient Privacy-Preserving Classification of ECG Signals. In IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09), Seiten 91-95. IEEE, 2009.
-
(2009)
IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09)
, pp. 91-95
-
-
Barni, M.1
Failla, P.2
Kolesnikov, V.3
Lazzeretti, R.4
Paus, A.5
Sadeghi, A.-R.6
Schneider, T.7
-
7
-
-
70350399649
-
Secure evaluation of private linear branching programs with medical applications
-
LNCS, Band 5789, Seiten, Springer
-
M. Barni, P. Failla, V. Kolesnikov, R. Lazzeretti, A.-R. Sadeghi und T. Schneider. Secure Evaluation of Private Linear Branching Programs with Medical Applications. In European Symposium on Research in Computer Security (ESORICS'09), LNCS, Band 5789, Seiten 424-439. Springer, 2009.
-
(2009)
European Symposium on Research in Computer Security (ESORICS'09)
, pp. 424-439
-
-
Barni, M.1
Failla, P.2
Kolesnikov, V.3
Lazzeretti, R.4
Sadeghi, A.-R.5
Schneider, T.6
-
8
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
LNCS, Band 3378, Seiten, Springer
-
D. Boneh, E.-J. Goh und K. Nissim. Evaluating 2-DNF Formulas on Ciphertexts. In Theory of Cryptography Cronference (TCC'05), LNCS, Band 3378, Seiten 325-341. Springer, 2005.
-
(2005)
Theory of Cryptography Cronference (TCC'05)
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
10
-
-
84898960610
-
Completeness theorems for non- cryptographic fault-tolerant distributed computation
-
Seiten, ACM
-
M. Ben-Or, S. Goldwasser und A. Wigderson. Completeness Theorems for Non- Cryptographic Fault-Tolerant Distributed Computation. In Symposium on Theory of Computing (STOC'88), Seiten 1-10. ACM, 1988.
-
(1988)
Symposium on Theory of Computing (STOC'88)
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
12
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
LNCS, Band 6110, Seiten, Springer
-
M. v. Dijk, C. Gentry, S. Halevi und V. Vaikuntanathan. Fully Homomorphic Encryption over the Integers. In Advances in Cryptology - EUROCRYPT'10, LNCS, Band 6110, Seiten 24-43. Springer, 2010.
-
(2010)
Advances in Cryptology - EUROCRYPT'10
, pp. 24-43
-
-
Dijk, M.V.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
13
-
-
67049134126
-
Asynchronous multiparty computation: Theory and implementation
-
LNCS, Band 5443, Seiten, Springer
-
I. Damgard, M. Geisler, M. Krøigard und J. B. Nielsen. Asynchronous Multiparty Computation: Theory and Implementation. In Public Key Cryptography (PKC'09), LNCS, Band 5443, Seiten 160-179. Springer, 2009. http://viff.dk.
-
(2009)
Public Key Cryptography (PKC'09)
, pp. 160-179
-
-
Damgard, I.1
Geisler, M.2
Krøigard, M.3
Nielsen, J.B.4
-
14
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
LNCS, Band 1992, Seiten, Springer
-
I. Damgard und M. Jurik. A Generalisation, a Simplification and some Applications of Paillier's Probabilistic Public-Key System. In Public-Key Cryptography (PKC'01), LNCS, Band 1992, Seiten 119-136. Springer, 2001.
-
(2001)
Public-Key Cryptography (PKC'01)
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
16
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Seiten, ACM
-
C. Gentry. Fully homomorphic encryption using ideal lattices. In ACM Symposium on Theory of Computing (STOC'09), Seiten 169-178. ACM, 2009.
-
(2009)
ACM Symposium on Theory of Computing (STOC'09)
, pp. 169-178
-
-
Gentry, C.1
-
17
-
-
77954628604
-
A Simple BGN-type cryptosystem from LWE
-
LNCS, Band 6110, Seiten, Springer
-
C. Gentry, S. Halevi und V. Vaikuntanathan. A Simple BGN-type Cryptosystem from LWE. In Advances in Cryptology - EUROCRYPT'10, LNCS, Band 6110, Seiten 506- 522. Springer, 2010.
-
(2010)
Advances in Cryptology - EUROCRYPT'10
, pp. 506-522
-
-
Gentry, C.1
Halevi, S.2
Vaikuntanathan, V.3
-
20
-
-
78649992236
-
Tool for automating secure two-partY computations
-
TASTY, ACM, October
-
W. Henecka, S. Kögl, A.-R. Sadeghi, T. Schneider und I. Wehrenberg. TASTY: Tool for Automating Secure Two-partY computations. In ACM Conference on Computer and Communications Security (CCS'10). ACM, October 4-8, 2010. http://tastyproject.net.
-
(2010)
ACM Conference on Computer and Communications Security (CCS'10)
, pp. 4-8
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
21
-
-
24144457853
-
Extending oblivious transfers efficiently
-
LNCS, Band 2729, Seiten, Springer
-
Y. Ishai, J. Kilian, K. Nissim und E. Petrank. Extending Oblivious Transfers Efficiently. In Advances in Cryptology - CRYPTO'03, LNCS, Band 2729, Seiten 145-161. Springer, 2003.
-
(2003)
Advances in Cryptology - CRYPTO'03
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
22
-
-
71549170830
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
LNCS, Band 5888, Seiten, Springer
-
V. Kolesnikov, A.-R. Sadeghi und T. Schneider. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. In Cryptology and Network Security (CANS'09), LNCS, Band 5888, Seiten 1-20. Springer, 2009.
-
(2009)
Cryptology and Network Security (CANS'09)
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
23
-
-
78650392298
-
Modular design of efficient secure function evaluation protocols
-
Report 2010/079
-
V. Kolesnikov, A.-R. Sadeghi und T. Schneider. Modular Design of Efficient Secure Function Evaluation Protocols. Cryptology ePrint Archive, Report 2010/079, 2010. http://eprint.iacr.org/2010/079/.
-
(2010)
Cryptology EPrint Archive
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
24
-
-
0142212246
-
A neurocomputational model for prostate carcinoma detection
-
P. Kalra, J. Togami, G. Bansal, A. W. Partin, M. K. Brawer, R. J. Babaian, L. S. Ross und C. S. Niederberger. A neurocomputational model for prostate carcinoma detection. Cancer, 98(9):1849-1854, 2003.
-
(2003)
Cancer
, vol.98
, Issue.9
, pp. 1849-1854
-
-
Kalra, P.1
Togami, J.2
Bansal, G.3
Partin, A.W.4
Brawer, M.K.5
Babaian, R.J.6
Ross, L.S.7
Niederberger, C.S.8
-
25
-
-
64249101946
-
A proof of yao's protocol for secure two-party computation
-
Cryptology ePrint Archive: Report 2004/175
-
Y. Lindell und B. Pinkas. A Proof of Yao's Protocol for Secure Two-Party Computation. Journal of Cryptology, 22(2):161-188, 2009. Cryptology ePrint Archive: Report 2004/175.
-
(2009)
Journal of Cryptology
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
26
-
-
70349967065
-
Google health: Birth of A GIANT
-
M. McBride. Google Health: Birth of a giant. Health Management Technology, 29:8- 10, 2008.
-
(2008)
Health Management Technology
, vol.29
, pp. 8-10
-
-
Mcbride, M.1
-
28
-
-
64049119146
-
Efficient oblivious transfer protocols
-
Seiten, Society for Industrial and Applied Mathematics
-
M. Naor und B. Pinkas. Efficient oblivious transfer protocols. In ACM-SIAM Symposium On Discrete Algorithms (SODA'01), Seiten 448-457. Society for Industrial and Applied Mathematics, 2001.
-
(2001)
ACM-SIAM Symposium on Discrete Algorithms (SODA'01)
, pp. 448-457
-
-
Naor, M.1
Pinkas, B.2
-
29
-
-
77955178939
-
SCiFI - A system for secure face identification
-
Seiten, IEEE
-
M. Osadchy, B. Pinkas, A. Jarrous und B. Moskovich. SCiFI - A System for Secure Face Identification. In IEEE Symposium on Security & Privacy (S&P'10), Seiten 239- 254. IEEE, 2010.
-
(2010)
IEEE Symposium on Security & Privacy (S&P'10)
, pp. 239-254
-
-
Osadchy, M.1
Pinkas, B.2
Jarrous, A.3
Moskovich, B.4
-
30
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
LNCS, Band 1592, Seiten, Springer
-
P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT'99, LNCS, Band 1592, Seiten 223-238. Springer, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT'99
, pp. 223-238
-
-
Paillier, P.1
-
31
-
-
72449131818
-
Secure two-party computation is practical
-
LNCS, Band 5912, Seiten, Springer
-
B. Pinkas, T. Schneider, N. P. Smart und S. C. Williams. Secure Two-Party Computation is Practical. In Advances in Cryptology - ASIACRYPT'09, LNCS, Band 5912, Seiten 250-267. Springer, 2009.
-
(2009)
Advances in Cryptology - ASIACRYPT'09
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
32
-
-
79955532534
-
Fully homomorphic encryption with relatively small key and ciphertext sizes
-
LNCS, Band 6056, Seiten, Springer
-
N. P. Smart und F. Vercauteren. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes. In Public Key Cryptography (PKC'10), LNCS, Band 6056, Seiten 420-443. Springer, 2010.
-
(2010)
Public Key Cryptography (PKC'10)
, pp. 420-443
-
-
Smart, N.P.1
Vercauteren, F.2
-
34
-
-
0028934871
-
An investigation of the relationship between antioxidant vitamin intake and coronary heart disease in men and women using discriminant analysis
-
S. Todd, M. Woodward, C. Bolton-Smith und H. Tunstall-Pedoe. An investigation of the relationship between antioxidant vitamin intake and coronary heart disease in men and women using discriminant analysis. Journal of Clinical Epidemiology, 48(2):297- 305, 1995.
-
(1995)
Journal of Clinical Epidemiology
, vol.48
, Issue.2
, pp. 297-305
-
-
Todd, S.1
Woodward, M.2
Bolton-Smith, C.3
Tunstall-Pedoe, H.4
|