-
2
-
-
0029719644
-
The space complexity of approximating the frequency moments
-
ALON, N., MATIAS, Y., AND SZEGEDY, M. The space complexity of approximating the frequency moments. In STOC (1996).
-
(1996)
STOC
-
-
Alon, N.1
Matias, Y.2
Szegedy, M.3
-
3
-
-
0027285039
-
Construction of age-related reference centiles using absolute residuals
-
ALTMAN, D. G. Construction of age-related reference centiles using absolute residuals. Statistics in medicine (1993).
-
(1993)
Statistics in Medicine
-
-
Altman, D.G.1
-
4
-
-
70350688131
-
Approximating edit distance in near-linear time
-
ANDONI, A., AND ONAK, K. Approximating edit distance in near-linear time. In 41st STOC (2009).
-
(2009)
41st STOC
-
-
Andoni, A.1
Onak, K.2
-
6
-
-
80755143980
-
Countering gattaca: Efficient and secure testing of fully-sequenced human genomes
-
BALDI, P., BARONIO, R., DE CRISTOFARO, E., GASTI, P., AND TSUDIK, G. Countering gattaca: efficient and secure testing of fully-sequenced human genomes. In CCS (2011).
-
(2011)
CCS
-
-
Baldi, P.1
Baronio, R.2
De Cristofaro, E.3
Gasti, P.4
Tsudik, G.5
-
7
-
-
17744373521
-
Approximating edit distance efficiently
-
BAR-YOSSEF, Z., JAYRAM, T. S., KRAUTHGAMER, R., AND KUMAR, R. Approximating edit distance efficiently. In 45th FOCS (2004).
-
(2004)
45th FOCS
-
-
Bar-Yossef, Z.1
Jayram, T.S.2
Krauthgamer, R.3
Kumar, R.4
-
8
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
BEAVER, D. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology (1991).
-
(1991)
Journal of Cryptology
-
-
Beaver, D.1
-
9
-
-
0029702967
-
Correlated pseudorandomness and the complexity of private computations
-
BEAVER, D. Correlated pseudorandomness and the complexity of private computations. In STOC (1996).
-
(1996)
STOC
-
-
Beaver, D.1
-
10
-
-
57949094403
-
Commodity-based cryptography (extended abstract)
-
BEAVER, D. Commodity-based cryptography (extended abstract). In STOC (1997).
-
(1997)
STOC
-
-
Beaver, D.1
-
11
-
-
84881232126
-
Efficient garbling from a fixed-key blockcipher
-
BELLARE, M., HOANG, V. T., KEELVEEDHI, S., AND ROGAWAY, P. Efficient garbling from a fixed-key blockcipher. In IEEE S & P (2013).
-
(2013)
IEEE S & P
-
-
Bellare, M.1
Hoang, V.T.2
Keelveedhi, S.3
Rogaway, P.4
-
12
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract)
-
BEN-OR, M., GOLDWASSER, S., AND WIGDERSON, A. Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In STOC (1988).
-
(1988)
STOC
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
13
-
-
1542748076
-
Aligning multiple genomic sequences with the threaded blockset aligner
-
BLANCHETTE, M., KENT, W. J., RIEMER, C., ELNITSKI, L., SMIT, A. F., ROSKIN, K. M., BAERTSCH, R., ROSENBLOOM, K., CLAWSON, H., GREEN, E. D., ET AL. Aligning multiple genomic sequences with the threaded blockset aligner. Genome research (2004).
-
(2004)
Genome Research
-
-
Blanchette, M.1
Kent, W.J.2
Riemer, C.3
Elnitski, L.4
Smit, A.F.5
Roskin, K.M.6
Baertsch, R.7
Rosenbloom, K.8
Clawson, H.9
Green, E.D.10
-
14
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
BLOOM, B. H. Space/time trade-offs in hash coding with allowable errors. Commun. ACM (1970).
-
(1970)
Commun. ACM
-
-
Bloom, B.H.1
-
16
-
-
0037398368
-
Lagan and multi-lagan: Efficient tools for large-scale multiple alignment of genomic DNA
-
BRUDNO, M., DO, C. B., COOPER, G. M., KIM, M. F., DAVYDOV, E., GREEN, E. D., SIDOW, A., BATZOGLOU, S., PROGRAM, N. C. S., ET AL. Lagan and multi-lagan: efficient tools for large-scale multiple alignment of genomic dna. Genome research (2003).
-
(2003)
Genome Research
-
-
Brudno, M.1
Do, C.B.2
Cooper, G.M.3
Kim, M.F.4
Davydov, E.5
Green, E.D.6
Sidow, A.7
Batzoglou, S.8
Program, N.C.S.9
-
18
-
-
14844367057
-
An improved data stream summary: The count-min sketch and its applications
-
CORMODE, G., AND MUTHUKRISHNAN, S. An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms (2005).
-
(2005)
Journal of Algorithms
-
-
Cormode, G.1
Muthukrishnan, S.2
-
19
-
-
84884886300
-
Multiparty computation from somewhat homomorphic encryption
-
DAMGÅRD, I., PASTRO, V., SMART, N. P., AND ZAKARIAS, S. Multiparty computation from somewhat homomorphic encryption. In CRYPTO (2012).
-
(2012)
CRYPTO
-
-
Damgård, I.1
Pastro, V.2
Smart, N.P.3
Zakarias, S.4
-
20
-
-
84888990465
-
When private set intersection meets big data: An efficient and scalable protocol
-
DONG, C., CHEN, L., AND WEN, Z. When private set intersection meets big data: an efficient and scalable protocol. In CCS (2013).
-
(2013)
CCS
-
-
Dong, C.1
Chen, L.2
Wen, Z.3
-
21
-
-
80053169971
-
What's the difference?: Efficient set reconciliation without prior context
-
EPPSTEIN, D., GOODRICH, M. T., UYEDA, F., AND VARGHESE, G. What's the difference?: efficient set reconciliation without prior context. In ACM SIGCOMM Computer Communication Review (2011).
-
(2011)
ACM SIGCOMM Computer Communication Review
-
-
Eppstein, D.1
Goodrich, M.T.2
Uyeda, F.3
Varghese, G.4
-
22
-
-
2642570170
-
Moving towards individualized medicine with pharmacogenomics
-
EVANS, W. E., AND RELLING, M. V. Moving towards individualized medicine with pharmacogenomics. Nature (2004).
-
(2004)
Nature
-
-
Evans, W.E.1
Relling, M.V.2
-
23
-
-
0003241823
-
Secure multiparty computation of approximations
-
FEIGENBAUM, J., ISHAI, Y., MALKIN, T., NISSIM, K., STRAUSS, M. J., AND WRIGHT, R. N. Secure multiparty computation of approximations. In Automata, Languages and Programming. 2001.
-
(2001)
Automata, Languages and Programming
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.3
Nissim, K.4
Strauss, M.J.5
Wright, R.N.6
-
24
-
-
0037943836
-
An approximate l1-difference algorithm for massive data streams
-
FEIGENBAUM, J., KANNAN, S., STRAUSS, M., AND VISWANATHAN, M. An approximate l1-difference algorithm for massive data streams. SIAM Journal of Computing (2002).
-
(2002)
SIAM Journal of Computing
-
-
Feigenbaum, J.1
Kannan, S.2
Strauss, M.3
Viswanathan, M.4
-
25
-
-
84893234795
-
Hyperloglog: The analysis of a near-optimal cardinality estimation algorithm
-
FLAJOLET, P., FUSY, É., GANDOUET, O., AND MEUNIER, F. Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm. DMTCS Proceedings (2008).
-
(2008)
DMTCS Proceedings
-
-
Flajolet, P.1
Fusy, E.2
Gandouet, O.3
Meunier, F.4
-
26
-
-
84970908992
-
MiniLEGO: Efficient secure two-party computation from general assumptions
-
FREDERIKSEN, T. K., JAKOBSEN, T. P., NIELSEN, J. B., NORDHOLT, P. S., AND ORLANDI, C. MiniLEGO: Efficient secure two-party computation from general assumptions. In EUROCRYPT (2013).
-
(2013)
EUROCRYPT
-
-
Frederiksen, T.K.1
Jakobsen, T.P.2
Nielsen, J.B.3
Nordholt, P.S.4
Orlandi, C.5
-
28
-
-
35048854576
-
How to play any mental game or A completeness theorem for protocols with honest majority
-
GOLDREICH, O., MICALI, S., AND WIGDERSON, A. How to play any mental game or A completeness theorem for protocols with honest majority. In STOC (1987).
-
(1987)
STOC
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
29
-
-
78650415869
-
Assessing the privacy risks of data sharing in genomics
-
HEENEY, C., HAWKINS, N., DE VRIES, J., BODDINGTON, P., AND KAYE, J. Assessing the privacy risks of data sharing in genomics. Public health genomics (2011).
-
(2011)
Public Health Genomics
-
-
Heeney, C.1
Hawkins, N.2
De Vries, J.3
Boddington, P.4
Kaye, J.5
-
30
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
HUANG, Y., EVANS, D., KATZ, J., AND MALKA, L. Faster secure two-party computation using garbled circuits. In USENIX Security Symposium (2011).
-
(2011)
USENIX Security Symposium
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
31
-
-
84878348015
-
Quid-Pro-Quo-tocols: Strengthening semi-honest protocols with dual execution
-
HUANG, Y., KATZ, J., AND EVANS, D. Quid-Pro-Quo-tocols: Strengthening semi-honest protocols with dual execution. In IEEE S & P (2012).
-
(2012)
IEEE S & P
-
-
Huang, Y.1
Katz, J.2
Evans, D.3
-
32
-
-
52249111886
-
Extending oblivious transfers efficiently
-
ISHAI, Y., KILIAN, J., NISSIM, K., AND PETRANK, E. Extending oblivious transfers efficiently. In CRYPTO 2003.
-
(2003)
CRYPTO
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
33
-
-
84906535500
-
Founding cryptography on oblivious transfer - Efficiently
-
ISHAI, Y., PRABHAKARAN, M., AND SAHAI, A. Founding cryptography on oblivious transfer - efficiently. In CRYPTO (2008).
-
(2008)
CRYPTO
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
35
-
-
70350549313
-
Efficient two-party secure computation on committed inputs
-
JARECKI, S., AND SHMATIKOV, V. Efficient two-party secure computation on committed inputs. In EUROCRYPT (2007).
-
(2007)
EUROCRYPT
-
-
Jarecki, S.1
Shmatikov, V.2
-
36
-
-
78149254461
-
Improved garbled circuit: Free XOR gates and applications
-
KOLESNIKOV, V., AND SCHNEIDER, T. Improved garbled circuit: Free XOR gates and applications. In ICALP (2008).
-
(2008)
ICALP
-
-
Kolesnikov, V.1
Schneider, T.2
-
37
-
-
0003625004
-
Privacy preserving data mining
-
LINDELL, Y., AND PINKAS, B. Privacy preserving data mining. In CRYPTO (2000).
-
(2000)
CRYPTO
-
-
Lindell, Y.1
Pinkas, B.2
-
38
-
-
67650136792
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
LINDELL, Y., AND PINKAS, B. An efficient protocol for secure two-party computation in the presence of malicious adversaries. In EUROCRYPT (2007).
-
(2007)
EUROCRYPT
-
-
Lindell, Y.1
Pinkas, B.2
-
39
-
-
64249101946
-
A proof of security of Yao's protocol for two-party computation
-
LINDELL, Y., AND PINKAS, B. A proof of security of Yao's protocol for two-party computation. Journal of Cryptology (2009).
-
(2009)
Journal of Cryptology
-
-
Lindell, Y.1
Pinkas, B.2
-
40
-
-
84914153789
-
Automating efficient RAM-model secure computation
-
LIU, C., HUANG, Y., SHI, E., KATZ, J., AND HICKS, M. W. Automating efficient RAM-model secure computation. In IEEE S & P (2014).
-
(2014)
IEEE S & P
-
-
Liu, C.1
Huang, Y.2
Shi, E.3
Katz, J.4
Hicks, M.W.5
-
41
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
MALKHI, D., NISAN, N., PINKAS, B., AND SELLA, Y. Fairplay - a secure two-party computation system. In USENIX Security Symposium (2004).
-
(2004)
USENIX Security Symposium
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
42
-
-
64049119146
-
Efficient oblivious transfer protocols
-
NAOR, M., AND PINKAS, B. Efficient oblivious transfer protocols. In SODA (2001).
-
(2001)
SODA
-
-
Naor, M.1
Pinkas, B.2
-
43
-
-
77954738941
-
Fast manhattan sketches in data streams
-
NELSON, J., AND WOODRUFF, D. P. Fast manhattan sketches in data streams. In PODS (2010).
-
(2010)
PODS
-
-
Nelson, J.1
Woodruff, D.P.2
-
44
-
-
84877028141
-
Comprehensive molecular portraits of human breast tumours
-
NETWORK, C. G. A., ET AL. Comprehensive molecular portraits of human breast tumours. Nature (2012).
-
(2012)
Nature
-
-
Network, C.G.A.1
-
45
-
-
80051628570
-
A new approach to practical active-secure two-party computation
-
NIELSEN, J. B., NORDHOLT, P. S., ORLANDI, C., AND BURRA, S. S. A new approach to practical active-secure two-party computation. In CRYPTO (2012).
-
(2012)
CRYPTO
-
-
Nielsen, J.B.1
Nordholt, P.S.2
Orlandi, C.3
Burra, S.S.4
-
46
-
-
77956992104
-
Secure two-party computation is practical
-
PINKAS, B., SCHNEIDER, T., SMART, N. P., AND WILLIAMS, S. C. Secure two-party computation is practical. In ASIACRYPT (2009).
-
(2009)
ASIACRYPT
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
47
-
-
0035173378
-
Dbsnp: The ncbi database of genetic variation
-
SHERRY, S. T., WARD, M.-H., KHOLODOV, M., BAKER, J., PHAN, L., SMIGIELSKI, E. M., AND SIROTKIN, K. dbsnp: the ncbi database of genetic variation. Nucleic acids research (2001).
-
(2001)
Nucleic Acids Research
-
-
Sherry, S.T.1
Ward, M.-H.2
Kholodov, M.3
Baker, J.4
Phan, L.5
Smigielski, E.M.6
Sirotkin, K.7
-
48
-
-
34250851446
-
Mathematical correction for fingerprint similarity measures to improve chemical retrieval
-
SWAMIDASS, S. J., AND BALDI, P. Mathematical correction for fingerprint similarity measures to improve chemical retrieval. Journal of chemical information and modeling (2007).
-
(2007)
Journal of Chemical Information and Modeling
-
-
Swamidass, S.J.1
Baldi, P.2
-
49
-
-
0034762644
-
Using genetic variation to study human disease
-
TAYLOR, J. G., CHOI, E.-H., FOSTER, C. B., AND CHANOCK, S. J. Using genetic variation to study human disease. Trends in molecular medicine (2001).
-
(2001)
Trends in Molecular Medicine
-
-
Taylor, J.G.1
Choi, E.-H.2
Foster, C.B.3
Chanock, S.J.4
-
50
-
-
1842435123
-
Tabulation based 4-universal hashing with applications to second moment estimation
-
THORUP, M., AND ZHANG, Y. Tabulation based 4-universal hashing with applications to second moment estimation. In SODA (2004).
-
(2004)
SODA
-
-
Thorup, M.1
Zhang, Y.2
-
51
-
-
84924056345
-
Whole genomes redefine the mutational landscape of pancreatic cancer
-
WADDELL, N., PAJIC, M., PATCH, A.-M., CHANG, D. K., KASSAHN, K. S., BAILEY, P., JOHNS, A. L., MILLER, D., NONES, K., QUEK, K., ET AL. Whole genomes redefine the mutational landscape of pancreatic cancer. Nature (2015).
-
(2015)
Nature
-
-
Waddell, N.1
Pajic, M.2
Patch, A.-M.3
Chang, D.K.4
Kassahn, K.S.5
Bailey, P.6
Johns, A.L.7
Miller, D.8
Nones, K.9
Quek, K.10
-
52
-
-
84906233102
-
Illuminating the future of DNA sequencing
-
WATSON, M. Illuminating the future of dna sequencing. Genome Biol (2014).
-
(2014)
Genome Biol
-
-
Watson, M.1
-
53
-
-
79961186203
-
Protocols for secure computations (extended abstract)
-
YAO, A. C.-C. Protocols for secure computations (extended abstract). In FOCS (1982).
-
(1982)
FOCS
-
-
Yao, A.C.-C.1
-
54
-
-
0003113271
-
How to generate and exchange secrets (extended abstract)
-
YAO, A. C.-C. How to generate and exchange secrets (extended abstract). In FOCS (1986).
-
(1986)
FOCS
-
-
Yao, A.C.-C.1
-
55
-
-
84945241362
-
Two halves make a whole - Reducing data transfer in garbled circuits using half gates
-
ZAHUR, S., ROSULEK, M., AND EVANS, D. Two halves make a whole - reducing data transfer in garbled circuits using half gates. In EUROCRYPT (2015).
-
(2015)
EUROCRYPT
-
-
Zahur, S.1
Rosulek, M.2
Evans, D.3
|