-
1
-
-
0004198295
-
-
Springer-Verlag, New York
-
N. Bourbaki, Algebra I, Springer-Verlag, New York, 1989.
-
(1989)
Algebra i
-
-
Bourbaki, N.1
-
2
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
ACM Press, New York
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, Completeness theorems for noncryptographic fault-tolerant distributed computation, in Proceedings of STOC 1988, ACM Press, New York, 1988, pp. 1-10.
-
(1988)
Proceedings of STOC 1988
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
70350343371
-
Asymptotically good ideal linear secret sharing with strong multiplication over any fixed finite field
-
Santa Barbara, CA, Lecture Notes in Comput. Sci. 5677, Springer-Verlag, New York
-
I. Cascudo, H. Chen, R. Cramer, and C. Xing, Asymptotically good ideal linear secret sharing with strong multiplication over any fixed finite field, in Proceedings of the 29th Annual IACR CRYPTO, Santa Barbara, CA, Lecture Notes in Comput. Sci. 5677, Springer-Verlag, New York, 2009, pp. 466-486.
-
(2009)
Proceedings of the 29th Annual IACR CRYPTO
, pp. 466-486
-
-
Cascudo, I.1
Chen, H.2
Cramer, R.3
Xing, C.4
-
4
-
-
80051980228
-
The torsion-limit for algebraic function fields and its application to arithmetic secret sharing
-
Santa Barbara, CA, Lecture Notes in Comput. Sci. 6842, Springer-Verlag, New York
-
I. Cascudo, R. Cramer, and C. Xing, The torsion-limit for algebraic function fields and its application to arithmetic secret sharing, in Proceedings of the of 31st Annual IACR CRYPTO, Santa Barbara, CA, Lecture Notes in Comput. Sci. 6842, Springer-Verlag, New York, 2011, pp. 685-705.
-
(2011)
Proceedings of the of 31st Annual IACR CRYPTO
, pp. 685-705
-
-
Cascudo, I.1
Cramer, R.2
Xing, C.3
-
5
-
-
84898947315
-
Multi-party unconditionally secure protocols
-
ACM Press, New York
-
D. Chaum, C. Crépeau, and I. Damgaard, Multi-party unconditionally secure protocols, in Proceedings of STOC 1988, ACM Press, New York, 1988, pp. 11-19.
-
(1988)
Proceedings of STOC 1988
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgaard, I.3
-
6
-
-
33749554579
-
Algebraic geometric secret sharing schemes and secure multi-party computation over small fields
-
Santa Barbara, CA, Lecture Notes in Comput. Sci. 4117, Springer-Verlag, New York
-
H. Chen and R. Cramer, Algebraic geometric secret sharing schemes and secure multi-party computation over small fields, in Proceedings of the 26th Annual IACR CRYPTO, Santa Barbara, CA, Lecture Notes in Comput. Sci. 4117, Springer-Verlag, New York, 2006, pp. 516-531.
-
(2006)
Proceedings of the 26th Annual IACR CRYPTO
, pp. 516-531
-
-
Chen, H.1
Cramer, R.2
-
7
-
-
38049177353
-
Secure computation from random error correcting codes
-
Barcelona, Spain, Lecture Notes in Comput. Sci. 4515, Springer-Verlag, New York
-
H. Chen, R. Cramer, S. Goldwasser, R. de Haan, and V. Vaikuntanathan, Secure computation from random error correcting codes, in Proceedings of the 27th Annual IACR EUROCRYPT, Barcelona, Spain, Lecture Notes in Comput. Sci. 4515, Springer-Verlag, New York, 2007, pp. 291-310.
-
(2007)
Proceedings of the 27th Annual IACR EUROCRYPT
, pp. 291-310
-
-
Chen, H.1
Cramer, R.2
Goldwasser, S.3
De Haan, R.4
Vaikuntanathan, V.5
-
8
-
-
84948975649
-
General secure multi-party computation from any linear secret sharing scheme
-
Brugge, Belgium, Lecture Notes in Comput. Sci. 1807, Springer-Verlag, New York
-
R. Cramer, I. Damgård, and U. Maurer, General secure multi-party computation from any linear secret sharing scheme, in Proceedings of 19th Annual IACR EUROCRYPT, Brugge, Belgium, Lecture Notes in Comput. Sci. 1807, Springer-Verlag, New York, 2000, pp. 316-334.
-
(2000)
Proceedings of 19th Annual IACR EUROCRYPT
, pp. 316-334
-
-
Cramer, R.1
Damgård, I.2
Maurer, U.3
-
10
-
-
0010851903
-
On the Arf invariant
-
R. H. Dye, On the Arf invariant, J. Algebra, 53 (1978), pp. 36-39.
-
(1978)
J. Algebra
, vol.53
, pp. 36-39
-
-
Dye, R.H.1
-
11
-
-
0026985378
-
Communication complexity of secure computation (extended abstract)
-
ACM Press, New York
-
M. K. Franklin and M. Yung, Communication complexity of secure computation (extended abstract), in Proceedings of STOC 1992, ACM Press, New York, 1992, pp. 699-710.
-
(1992)
Proceedings of STOC 1992
, pp. 699-710
-
-
Franklin, M.K.1
Yung, M.2
-
12
-
-
35448945589
-
Zero-knowledge from secure multiparty computation
-
San Diego, CA, ACM Press, New York
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, Zero-knowledge from secure multiparty computation, in Proceedings of 39th STOC, San Diego, CA, ACM Press, New York, 2007, pp. 21-30.
-
(2007)
Proceedings of 39th STOC
, pp. 21-30
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
13
-
-
33645900924
-
Introduction to quadratic forms over fields
-
AMS, Providence, RI
-
T. Y. Lam, Introduction to Quadratic Forms over Fields. Grad. Stud. Math. 67, AMS, Providence, RI, 2005.
-
(2005)
Grad. Stud. Math.
, vol.67
-
-
Lam, T.Y.1
-
15
-
-
0003353410
-
A course in arithmetic
-
Springer-Verlag, New York
-
J.-P. Serre, A course in arithmetic, Grad. Texts in Math. 7, Springer-Verlag, New York, 1973.
-
(1973)
Grad. Texts in Math.
, vol.7
-
-
Serre, J.-P.1
-
16
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Comm. ACM, 22 (1979), pp. 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|