-
1
-
-
0025230154
-
Secure circuit evaluation, a protocol based on hiding information from an oracle
-
M. Abadi and J. Feigenbaum, "Secure circuit evaluation, a protocol based on hiding information from an oracle," Journal of Cryptology, 2(1), p. 1-12, 1990.
-
(1990)
Journal of Cryptology
, vol.2
, Issue.1
, pp. 1-12
-
-
Abadi, M.1
Feigenbaum, J.2
-
3
-
-
84864708144
-
Multiparty computations ensuring privacy of each party's input and correctness of the result
-
(Lecture Notes in Computer Science,), ed. C. Pomerance, Springer-Verlag, New York
-
D. Chaum, I. Damgârd and J. van de Graaf, "Multiparty computations ensuring privacy of each party's input and correctness of the result," in Advances in Cryptology-CRYPTO '87 Proceedings (Lecture Notes in Computer Science, Vol. 293), ed. C. Pomerance, p. 87-119, Springer-Verlag, New York, 1988.
-
(1988)
Advances in Cryptology-CRYPTO '87 Proceedings
, vol.293
, pp. 87-119
-
-
Chaum, D.1
Damgârd, I.2
van de Graaf, V.3
-
4
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz and M. Sudan, "Private information retrieval," Proc. of 36th IEEE Conference on the Foundations of Computer Science (FOCS), p. 41-50, 1995.
-
(1995)
Proc. of 36th IEEE Conference on the Foundations of Computer Science (FOCS)
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
6
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, A. Lempel. "A randomized protocol for signing contracts." Communications of the ACM, vol. 28, 1985, pp. 637-647.
-
(1985)
Communications of the ACM
, vol.28
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
8
-
-
0002992068
-
Joint encryption and message-efficient secure computation
-
Autumn
-
M. Franklin and S. Haber, "Joint encryption and message-efficient secure computation," Journal of Cryptology, 9(4), p. 217-232, Autumn 1996.
-
(1996)
Journal of Cryptology
, vol.9
, Issue.4
, pp. 217-232
-
-
Franklin, M.1
Haber, S.2
-
10
-
-
85032194875
-
How to solve any protocol problem: An efficiency improvement
-
LNCS 293, Springer Verlag
-
O. Goldreich, R. Vainish. "How to solve any protocol problem: an efficiency improvement," Proceedings of Crypto'87, LNCS 293, pp. 73-86, Springer Verlag, 1987.
-
(1987)
Proceedings of Crypto'87
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
13
-
-
0002760854
-
Algorithms for selfish agents
-
Trier, Germany, March
-
N. Nisan, "Algorithms for selfish agents," Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science, Trier, Germany, March 1999, p. 1-15.
-
(1999)
Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science
, pp. 1-15
-
-
Nisan, N.1
-
14
-
-
35248824977
-
On software protection via function hiding
-
Portland, Oregon, USA, April
-
T. Sander and C. Tschudin, "On software protection via function hiding," Proceedings of the second workshop on Information Hiding, Portland, Oregon, USA, April 1998.
-
(1998)
Proceedings of the second workshop on Information Hiding
-
-
Sander, T.1
Tschudin, C.2
|