-
1
-
-
0024940038
-
Non-Cryptographic Fault-Tolerant Computing in a Constant Expected Number of Rounds of Interaction
-
J. Bar-Ilan, D. Beaver. “Non-Cryptographic Fault-Tolerant Computing in a Constant Expected Number of Rounds of Interaction.” Proceedings of PODC, ACM, 1989, 201-209.
-
(1989)
Proceedings of PODC, ACM
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
2
-
-
0009011118
-
Bounded Width Polynomial Size Branching Programs Recognize Exactly those Languages in NC1
-
D. Barrington. “Bounded Width Polynomial Size Branching Programs Recognize Exactly those Languages in NC1.” Proceedings of the 18th STOC, ACM, 1986, 1-5.
-
(1986)
Th STOC, ACM
, pp. 1-5
-
-
Barrington, D.1
-
3
-
-
84933507780
-
Efficient Multiparty Protocols Using Circuit Randomization
-
Springer-Verlag LNCS 576
-
D. Beaver. “Efficient Multiparty Protocols Using Circuit Randomization.” Advances in Cryptology - Crypto ’91 Proceedings, Springer-Verlag LNCS 576, 1992, 420-432.
-
(1992)
Advances in Cryptology - Crypto ’91 Proceedings
, pp. 420-432
-
-
Beaver, D.1
-
4
-
-
0025137207
-
The Round Complexity of Secure Protocols
-
D. Beaver, S. Micali, P. Rogaway. “The Round Complexity of Secure Protocols.” Proceedings of the 22nd STOC, ACM, 1990, 503-513.
-
(1990)
Nd STOC, ACM
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
5
-
-
84880193265
-
Computing Algebraic Formulas Using a Constant Number of Registers
-
M. Ben-Or, R. Cleve. “Computing Algebraic Formulas Using a Constant Number of Registers.” Proceedings of the 20th STOC, ACM, 1988, 254-257.
-
(1988)
Th STOC, ACM
, pp. 254-257
-
-
Ben-Or, M.1
Cleve, R.2
-
6
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
M. Ben-Or, S. Goldwasser, A. Wigderson. “Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation.” Proceedings of the 20th STOC, ACM, 1988, 1-10.
-
(1988)
Th STOC, ACM
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
84898947315
-
Multiparty Unconditionally Secure Protocols
-
D. Chaum, C. Crépeau, I. Damgaard. “Multiparty Unconditionally Secure Protocols.” Proceedings of the 20th STOC, ACM, 1988, 11-19.
-
(1988)
Th STOC, ACM
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgaard, I.3
-
8
-
-
0002859474
-
Multiparty Computations Ensuring Secrecy of Each Partys Input and Correctness of the Output
-
Springer-Verlag LNCS 293
-
D. Chaum, I. Damgard, J. van de Graaf. “Multiparty Computations Ensuring Secrecy of Each Party’s Input and Correctness of the Output.” Advances in Cryptology - Crypto ’87 Proceedings, Springer-Verlag LNCS 293, 1988.
-
(1988)
Advances in Cryptology - Crypto ’87 Proceedings
-
-
Chaum, D.1
Damgard, I.2
Van De Graaf, J.3
-
11
-
-
33746337429
-
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
-
A. Fiat, A. Shamir. “How to Prove Yourself: Practical Solutions to Identification and Signature Problems.” Proc. of Crypto ’86.
-
Proc. Of Crypto ’86
-
-
Fiat, A.1
Shamir, A.2
-
12
-
-
0024135240
-
Zero Knowledge Proofs of Identity
-
U. Feige, A. Fiat, A. Shamir. “Zero Knowledge Proofs of Identity.” J. Cryptology 1: 2, 1988, 77-94.
-
(1988)
J. Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
13
-
-
0027986369
-
A Minimal Model for Secure Computation
-
U. Feige, J. Kilian, M. Naor. “A Minimal Model for Secure Computation.” Proceedings of the 26th STOC, ACM, 1994, 554-563.
-
(1994)
Th STOC, ACM
, pp. 554-563
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
14
-
-
0022914590
-
Proofs that Yield Nothing but their Validity and a Methodology of Cryptographic Protocol Design
-
IEEE
-
O. Goldreich, S. Micali, A. Wigderson. “Proofs that Yield Nothing but their Validity and a Methodology of Cryptographic Protocol Design.” Proceedings of the 27th FOCS, IEEE, 1986. pages 174-187. IEEE, 1986.
-
(1986)
Th FOCS, IEEE, 1986
, pp. 174-187
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
15
-
-
0023545076
-
How to Play Any Mental Game, or A Completeness Theorem for Protocols with Honest Majority
-
O. Goldreich, S. Micali, A. Wigderson. “How to Play Any Mental Game, or A Completeness Theorem for Protocols with Honest Majority.” Proceedings of the 19th STOC, ACM, 1987, 218-229.
-
(1987)
Th STOC, ACM
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
16
-
-
0021409284
-
Probabilistic Encryption
-
S. Goldwasser, S. Micali. Probabilistic Encryption. JCCS, 28: 2, 270-299, 1984.
-
JCCS
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
17
-
-
84898989941
-
Founding Cryptography on Oblivious Transfer
-
J. Kilian. “Founding Cryptography on Oblivious Transfer.” Proceedings of the 20th STOC, ACM, 1988, 20-29.
-
(1988)
Th STOC, ACM
, pp. 20-29
-
-
Kilian, J.1
-
19
-
-
40249087763
-
Number-Theoretic Consturctions of Efficient Pseudo-Random Functions
-
M. Naor, O. Reingold. “Number-Theoretic Consturctions of Efficient Pseudo-Random Functions.” Proceedings of the 38th FOCS, IEEE, 1997.
-
(1997)
Th FOCS, IEEE
-
-
Naor, M.1
Reingold, O.2
-
20
-
-
77953754678
-
How to Exchange Secrets by Oblivious Transfer
-
Harvard
-
M.O. Rabin. “How to Exchange Secrets by Oblivious Transfer.” TR-81, Harvard, 1981.
-
(1981)
TR-81
-
-
Rabin, M.O.1
-
21
-
-
0033309271
-
Non-Interactive CryptoComputing for NC1
-
T. Sander, A. Young, M. Yung. “Non-Interactive CryptoComputing for NC1.” Proceedings of the 40th FOCS, IEEE, 1999.
-
(1999)
Th FOCS, IEEE
-
-
Sander, T.1
Young, A.2
Yung, M.3
-
22
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. “How to Share a Secret.” Communications of the ACM, 22, 1979, 612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
23
-
-
0005044302
-
On the Security of ElGamal-based Encryption
-
Springer-Verlag
-
Y. Tsiounis, M. Yung. “On the Security of ElGamal-based Encryption.” Proceedings of PKC ’98, LNCS, Springer-Verlag, 1998.
-
(1998)
Proceedings of PKC ’98, LNCS
-
-
Tsiounis, Y.1
Yung, M.2
-
24
-
-
0020312165
-
Protocols for Secure Computations
-
A. Yao. “Protocols for Secure Computations.” Proceedings of the 23rd FOCS, IEEE, 1982, 160-164.
-
(1982)
Rd FOCS, IEEE
, pp. 160-164
-
-
Yao, A.1
-
25
-
-
0022882770
-
How to Generate and Exchange Secrets
-
A. Yao. “How to Generate and Exchange Secrets.” Proceedings of the 27th FOCS, IEEE, 1986, 162-167.
-
(1986)
Th FOCS, IEEE
, pp. 162-167
-
-
Yao, A.1
|