-
3
-
-
0025137207
-
The round complexity of secure protocols
-
D. Beaver, S. Micali, and P. Rogaway, The round complexity of secure protocols, in Proc. 22nd Annual ACM Symposium on Theory of Computing (STOC), pp. 503-513, 1990.
-
(1990)
Proc. 22nd Annual ACM Symposium on Theory of Computing (STOC)
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
5
-
-
84969520105
-
Optimistic Fair Secure Computation
-
Mihir Bellare, editor, Advances in Cryptology: CRYPTO 2000, Springer
-
Christian Cachin and Jan Camenisch, Optimistic Fair Secure Computation, In Mihir Bellare, editor, Advances in Cryptology: CRYPTO 2000, Vol. 1880, Lecture Notes in Computer Science, pages 94-112. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 94-112
-
-
Cachin, C.1
Camenisch, J.2
-
6
-
-
84864708144
-
Multiparty computations ensuring privacy of each party's input and correctness of the result
-
Advances in Cryptology: CRYPTO '87 (C. Pomerance, ed.), Springer
-
D. Chaum, I. Damgard, and J. van de Graaf, Multiparty computations ensuring privacy of each party's input and correctness of the result, in Advances in Cryptology: CRYPTO '87 (C. Pomerance, ed.), Vol. 293, Lecture Notes in Computer Science, Springer, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.293
-
-
Chaum, D.1
Damgard, I.2
Van De Graaf, J.3
-
7
-
-
0027986369
-
A minimal model for secure computation
-
U. Feige, J. Kilian, and M. Naor, A minimal model for secure computation, in Proc. 26th Annual ACM Symposium on Theory of Computing (STOC), pp. 554-563, 1994.
-
(1994)
Proc. 26th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 554-563
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
9
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Advances in Cryptology: CRYPTO '90 (A. J. Menezes and S. A. Vanstone, eds.), Springer
-
S. Goldwasser and L. Levin, Fair computation of general functions in presence of immoral majority, in Advances in Cryptology: CRYPTO '90 (A. J. Menezes and S. A. Vanstone, eds.), Vol. 537, Lecture Notes in Computer Science, Springer, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.537
-
-
Goldwasser, S.1
Levin, L.2
-
10
-
-
0039253846
-
Mining frequent patterns without candidate generation
-
Dallas, Texas, May
-
J. Han, J. Pei, and Y. Yin. Mining frequent patterns without candidate generation. In Proceedings of the 2000 SIGMOD International Conference on Management of Data, pages 1-12, Dallas, Texas, May 2000.
-
(2000)
Proceedings of the 2000 SIGMOD International Conference on Management of Data
, pp. 1-12
-
-
Han, J.1
Pei, J.2
Yin, Y.3
-
11
-
-
0003462641
-
-
Technical report Aiken Computation Laboratory, Harvard University
-
M. Rabin, "How to exchange secrets by oblivious transfer", Technical report TR-81, Aiken Computation Laboratory, Harvard University, 1981.
-
(1981)
How to Exchange Secrets by Oblivious Transfer
-
-
Rabin, M.1
-
12
-
-
84969550750
-
-
http://www.eskimo.com/ weidai/cryptlib.html
-
-
-
|